
Summary
The 'Windows TOR Client Execution' detection rule monitors Windows endpoints for the execution of the TOR Browser and its related components using process creation logs. The use of TOR can indicate malicious intent, such as anonymizing command-and-control communications, facilitating data exfiltration, or evading detection mechanisms. Given that TOR's legitimate use for research and privacy exists, any occurrence of its installation or execution in enterprise environments should be scrutinized to discern user intent and potential enterprise policy violations.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1090
- T1090.003
Created: 2026-02-02