heroui logo

Get ADUserResultantPasswordPolicy with Powershell

Splunk Security Content

View Source
Summary
This analytic detects instances where `powershell.exe` is executed specifically with the `Get-ADUserResultantPasswordPolicy` cmdlet, which retrieves the password policy from an Active Directory domain. The detection rule utilizes telemetry from Endpoint Detection and Response (EDR) tools for monitoring process executions in a Windows environment. The ability to gather information on password policies can be a precursor to more malicious actions such as brute-force attacks or password spraying, making this detection significant for identifying potential reconnaissance activities by attackers within the network. The use of EDR data ensures a comprehensive capture of relevant events, including process creation and command-line arguments.
Categories
  • Windows
  • Endpoint
  • Identity Management
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Windows Registry
  • Logon Session
ATT&CK Techniques
  • T1201
Created: 2024-11-13