
Summary
The analytic rule detects the execution of the `Get-DomainPolicy` cmdlet, which is a PowerShell command used to retrieve password policy settings from a Windows Active Directory domain. This action is logged through PowerShell Script Block Logging, specifically capturing EventCode 4104. The detection is crucial since attempts to query domain policies can indicate reconnaissance activities by adversaries or Red Teams, who may seek to gather specific insights into domain security settings to facilitate privilege escalation or lateral movement within a network. By monitoring for this command execution, security teams can gain visibility into potentially malicious behavior associated with domain policy exploration, allowing for timely mitigation before an attacker can exploit the gathered information effectively.
Categories
- Windows
- Endpoint
- Identity Management
Data Sources
- Pod
- Persona
- User Account
ATT&CK Techniques
- T1201
- T1059.001
Created: 2024-11-13