heroui logo

Windows Level RMM Watchdog Task Created

Splunk Security Content

View Source
Summary
This rule detects the creation of the Level RMM watchdog task on Windows by monitoring Windows Security Event ID 4698 for a TaskName of "\\Level\\Level Watchdog". Such a task is used by the Level remote management tool and can facilitate persistence and execution on a host. While Level may be legitimately used by IT staff, threat actors can abuse remote administration tools for unauthorized access. The detection aggregates by EventID, TaskName, and computer, then computes first/last seen times and applies a normalization filter (windows_level_rmm_watchdog_task_created_filter) to support correlation with the Endpoint data model. Implementing this rule requires telemetry from EDR/endpoint agents that captures process GUID, process name, parent process, and complete command lines, enabling CIM-aligned mapping to the Processes node for consistent detection and analytics.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1053
  • T1219
Created: 2026-04-13