
Summary
This rule is designed to detect attempts to enumerate file shares, printer shares, and user sessions on a Windows machine using the "net.exe" utility with the "view" flag. The detection mechanism focuses on process creation events, particularly those triggered by the execution of "net.exe" or "net1.exe" with the keyword "view" in the command line. The presence of double backslashes in the command line indicates a network path, which is essential for the enumeration activity being monitored by this rule. While legitimate users may run this command for administrative purposes, the rule flags all such usage for review, thus allowing security analysts to discern between legitimate and suspicious behavior. The false positive potential is relatively low, but security teams should remain aware of benign uses of net.exe by authorized personnel.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1018
Created: 2018-10-30