
Summary
This analytic detects instances where `powershell.exe` is executed specifically with the `Get-ADUserResultantPasswordPolicy` cmdlet, which retrieves the password policy from an Active Directory domain. The detection rule utilizes telemetry from Endpoint Detection and Response (EDR) tools for monitoring process executions in a Windows environment. The ability to gather information on password policies can be a precursor to more malicious actions such as brute-force attacks or password spraying, making this detection significant for identifying potential reconnaissance activities by attackers within the network. The use of EDR data ensures a comprehensive capture of relevant events, including process creation and command-line arguments.
Categories
- Windows
- Endpoint
- Identity Management
Data Sources
- Windows Registry
- Process
- Windows Registry
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1201
Created: 2024-11-13