
Summary
The rule identifies file transfers occurring via the ScreenConnect remote management tool, specifically looking for events indicating files have been transferred. This detection is based on monitoring Event ID 201 from the ScreenConnect provider, which logs actions pertaining to file transfers. If the log entry contains the phrase 'Transferred files with action,' it triggers an alert. The strategy is to utilize the information from the Windows application logging to pinpoint potential misuse of ScreenConnect, which is a legitimate tool that could be exploited for malicious purposes. The rule has been categorized as low severity because legitimate uses of ScreenConnect by authorized personnel are common, which may lead to false positives. It aims to help security personnel quickly identify unauthorized file transfers that may indicate potential security incidents while carefully managing alerts to avoid overwhelming resources with legitimate activities.
Categories
- Windows
- Endpoint
- Cloud
- Application
Data Sources
- Application Log
- Process
Created: 2023-10-10