
Summary
The Windows BootLoader Inventory analytic is designed to monitor the bootloader paths on Windows endpoints using a PowerShell script to gather the necessary data. This process captures and aggregates bootloader path information in Splunk, making it a critical component for security operations centers (SOC). By monitoring these paths, organizations can detect unauthorized changes that could signify the presence of bootkits or other persistent threats. Such threats could allow attackers to maintain persistence on compromised systems and bypass security controls, leading potentially to full system control and compromise. This analytic helps enhance security posture by identifying potential anomalies in bootloader configurations, documenting first and last times of detections, and ensuring timely responses to unauthorized modifications.
Categories
- Windows
- Endpoint
Data Sources
- Script
- Logon Session
ATT&CK Techniques
- T1542.001
- T1542
Created: 2024-11-13