
Summary
The detection rule titled "GetDomainController with PowerShell" is designed to identify the execution of the PowerShell command `Get-DomainController`, which is commonly used for discovering remote systems within a Windows domain. This command can provide attackers with significant insight into the network's structure and security posture, as it enumerates domain controllers that are vital for Active Directory (AD) operations. The rule leverages data from Endpoint Detection and Response (EDR) systems, specifically processing telemetry such as process names and command-line arguments. The analytic is particularly important because the `Get-DomainController` command could indicate reconnaissance activities in an environment, potentially leading to further exploitation and lateral movement by adversaries if not detected promptly. The detection works through various data sources, including Sysmon and Windows Event Logs, focusing on event ID 4688, which logs process creation events. By monitoring instances where PowerShell runs this specific command, security teams can respond to potential threats against their AD infrastructure.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1018
Created: 2024-11-13