
Summary
This detection rule is designed to identify when PowerShell Web Access is enabled on Windows systems through the execution of specific PowerShell commands. By monitoring PowerShell Script Block Logging (specifically EventCode 4104), the rule captures attempts to use commands such as `Install-WindowsFeature` with the `WindowsPowerShellWebAccess` parameter. Activating PowerShell Web Access is particularly concerning as it opens the door for remote execution of PowerShell commands, which attackers might exploit to gain unauthorized access to a network. The rule facilitates security teams in detecting and responding to the potential misuse of PowerShell Web Access features and emphasizes the need for stringent monitoring of PowerShell activity.
Categories
- Windows
- Endpoint
Data Sources
- Pod
- Process
- Application Log
ATT&CK Techniques
- T1059.001
Created: 2024-11-13