heroui logo

Windows IIS Server PSWA Console Access

Splunk Security Content

View Source
Summary
The rule is designed to detect access attempts to the PowerShell Web Access (PSWA) console on Windows Internet Information Services (IIS) servers. It functions by monitoring web traffic and specifically looks for requests made to PSWA-related URIs. This detection is important because although some access may indicate legitimate administrative actions, it might also reveal unauthorized access attempts, such as brute-force attacks. By analyzing attributes like source IP addresses, HTTP status codes, URI paths, and HTTP methods, the system can identify suspicious activity targeting the PSWA interface. Maintaining security for remote PowerShell management operations is critical, and this detection helps prevent exploitation of these tools. Organizations should implement this rule by ensuring they track web traffic accurately and have the appropriate data sources mapped to the Web datamodel.
Categories
  • Web
  • Windows
  • Network
Data Sources
  • Windows Registry
  • Web Credential
  • Logon Session
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1190
Created: 2024-11-15