heroui logo

Get ADDefaultDomainPasswordPolicy with Powershell

Splunk Security Content

View Source
Summary
This analytic detection rule identifies the execution of the `Get-ADDefaultDomainPasswordPolicy` cmdlet from `powershell.exe` in a Windows environment, utilizing data from various endpoint data sources including Sysmon and Windows Event Logs. The primary goal is to detect unauthorized attempts to retrieve domain password policies, which could indicate malicious reconnaissance activities by attackers targeting Active Directory setups. By monitoring processes and command-line invocations, security teams can derive insights into potential security incidents and anomalies within the network. Valid outcomes include both legitimate administrative tasks and potential malicious attempts, necessitating careful evaluation of the context and further investigation when detected.
Categories
  • Windows
  • Endpoint
  • Identity Management
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1201
Created: 2024-11-13