heroui logo

PowerShell Script Change Permission Via Set-Acl

Sigma Rules

View Source
Summary
This detection rule focuses on monitoring PowerShell execution that modifies Access Control Lists (ACLs) for files or folders using the 'Set-Acl' cmdlet. It captures instances where PowerShell is invoked with specific parameters that are indicative of permission changes. The rule is designed to identify unauthorized modifications or potential evasion techniques, particularly in environments where critical files require strict permission controls. By analyzing command-line arguments and the originating PowerShell executable, it achieves high fidelity in detecting suspicious activities. This rule is crucial for maintaining security posture against misuse of PowerShell, which often serves as a vector for exploitation and unauthorized access.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1505.005
Created: 2022-10-18