
Summary
The rule titled "Windows RMM Named Pipe" is designed to detect anomalies associated with the unexpected creation or connection to named pipes commonly exploited by remote monitoring and management (RMM) tools. Utilizing Sysmon EventCodes 17 and 18, it monitors for interactions with named pipes that are known to be utilized by malicious entities for persistence or command and control activities. The search query filters out common, legitimate applications to reduce false positives and focuses on unusual pipe activities that deviate from the norm. By analyzing the process paths and correlating them with suspicious named pipes from a predefined list, this detection rule aims to provide insights into potentially malicious behaviors on Windows endpoints.
Categories
- Endpoint
Data Sources
- Process
- Named Pipe
- Application Log
ATT&CK Techniques
- T1218
- T1559
- T1021.002
- T1055
Created: 2025-12-05