
Summary
The 'Windows Proxy Via Netsh' detection rule is designed to identify the unauthorized use of the Windows command-line tool netsh.exe, specifically focusing on its 'portproxy' and 'v4tov4' parameters. Such activities can indicate attempts by threat actors to manipulate network settings for persistence or to redirect network traffic. The rule operates using data sourced from Endpoint Detection and Response (EDR) agents, including Sysmon Event ID 1, Windows Event Log Security 4688, and CrowdStrike ProcessRollup2, analyzing process creation events related to netsh. When suspicious netsh commands are detected, it suggests possible malicious activities that could render endpoints vulnerable to unauthorized access and data manipulation. This detection is crucial in monitoring for potential network misconfigurations that could compromise security by enabling covert access paths.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1090.001
- T1090
Created: 2024-11-13