
Summary
Detects DNS queries to commonly abused remote monitoring and management (RMM) or remote access domains initiated by non-browser processes on Windows endpoints. The rule flags first-time DNS lookups to a curated list of RMM/remote-access domains when the initiating process is not a browser, aiming to surface non-browser RMM clients, scripts, or other tools contacting these services. It leverages endpoint network data (DNS questions) and Windows/Sysmon-related data (process name, executable, parent process, code signature) to identify the requester and context. The rule supports investigation by correlating with process lineage, verifying code signatures, and cross-referencing with related alerts (e.g., first-time RMM execution). It ties to MITRE ATT&CK via T1219 (Remote Access Tools) and T1219.002 (Remote Desktop Software) under the Command and Control tactic, reflecting the potential for C2 or lateral movement. False positives may arise from legitimate, approved RMM or updater tooling; mitigate by allowlisting known tools by path or signer and validating trust. Recommended response includes host isolation if unauthorized, removal of the RMM, credential rotation, and DNS/firewall blocks for the detected domains, along with enforcing strict allowlists for approved RMM tools and publishers.
Categories
- Endpoint
- Windows
- Network
Data Sources
- Process
- Network Traffic
ATT&CK Techniques
- T1219
- T1219.002
Created: 2026-03-03