heroui logo

Potential PowerShell Execution Policy Tampering - ProcCreation

Sigma Rules

View Source
Summary
This rule is designed to detect potential tampering with PowerShell execution policies that could indicate an attempt to bypass security measures for script execution. The primary focus is on changes to the relevant registry key for execution policies, particularly those that may allow untrusted scripts to run without proper signing. The detection logic looks for command line execution that contains specific registry paths related to PowerShell execution policies and certain unsafe policy settings such as 'Bypass', 'RemoteSigned', or 'Unrestricted'. If any of these conditions are met, the rule triggers an alert, indicating a possible security risk of defense evasion through unauthorized changes to the PowerShell execution policy.
Categories
  • Windows
Data Sources
  • Windows Registry
  • Process
Created: 2023-01-11