heroui logo

Remote System Discovery with Net

Splunk Security Content

View Source
Summary
The analytic rule titled "Remote System Discovery with Net" detects potential reconnaissance activities performed by adversaries using the `net.exe` or `net1.exe` commands to discover remote systems within a network. Specifically, it focuses on command-line arguments like `domain computers /domain`, which are indicative of efforts to enumerate Active Directory structures. This detection mechanism utilizes various data sources, including Sysmon logs and Windows Event Log Security events (EventID 4688). The primary goal is to identify unauthorized system discovery actions, which may imply elevated risks such as network exploitation, privilege escalation, or lateral movement. As this analytic has been deprecated, users are advised to transition to two dedicated analytics instead, ensuring continued threat detection capabilities in their environments.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1018
Created: 2025-01-13