
Summary
The detection rule focuses on monitoring the creation of shadow copies on Windows operating systems using various built-in utilities, which is often associated with credential access attacks. Shadow copies, when created inappropriately or without authorization, can potentially expose sensitive data, especially stored credentials. The rule targets process creation events specifically looking for executables that are commonly used to manage shadow copies, including PowerShell, WMIC, and VSSADMIN. When these processes are invoked with command-line parameters that include 'shadow' or 'create', they trigger an alert. The detection is designed to filter out legitimate administrative actions by acknowledging false positives that may occur when legitimate administrators perform maintenance or backup tasks. It is an essential security measure in preventing unauthorized access and ensuring that sensitive information remains protected.
Categories
- Windows
- Endpoint
- Application
Data Sources
- Process
Created: 2019-10-22