
Summary
This rule detects the creation of the Level RMM watchdog task on Windows by monitoring Windows Security Event ID 4698 for a TaskName of "\\Level\\Level Watchdog". Such a task is used by the Level remote management tool and can facilitate persistence and execution on a host. While Level may be legitimately used by IT staff, threat actors can abuse remote administration tools for unauthorized access. The detection aggregates by EventID, TaskName, and computer, then computes first/last seen times and applies a normalization filter (windows_level_rmm_watchdog_task_created_filter) to support correlation with the Endpoint data model. Implementing this rule requires telemetry from EDR/endpoint agents that captures process GUID, process name, parent process, and complete command lines, enabling CIM-aligned mapping to the Processes node for consistent detection and analytics.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1053
- T1219
Created: 2026-04-13