heroui logo

Windows Forest Discovery with GetForestDomain

Splunk Security Content

View Source
Summary
The detection rule identifies the execution of the `Get-ForestDomain` cmdlet, which is part of the PowerView toolkit commonly used for enumerating Windows domain configurations. By monitoring PowerShell Script Block Logging (EventCode=4104), this rule can highlight potentially malicious activities by adversaries who may utilize this cmdlet to gain insight into the Active Directory structure. This understanding may allow attackers to facilitate lateral movement or execute privilege escalation strategies within a compromised environment. It is crucial to monitor for such activities as part of a broader security strategy to safeguard against unauthorized access and data breaches in Windows environments.
Categories
  • Endpoint
Data Sources
  • Persona
  • Pod
ATT&CK Techniques
  • T1087
  • T1087.002
Created: 2024-11-13