
Summary
The rule 'Enable Host Network Discovery via Netsh' identifies the use of the 'netsh.exe' command-line utility on Windows systems to enable network discovery, which allows for communication between devices on the same local network. This can be exploited by attackers to weaken host firewall settings and facilitate lateral movement within the network. The rule is implemented using EQL (Event Query Language) to detect when 'netsh.exe' is executed with specific arguments that enable network discovery.
When network discovery is turned on, hosts can send broadcast messages to find and communicate with other devices, raising the risk of unauthorized access or attacks on other systems in the network. The detection rule checks for the process name and its arguments to determine whether the command was executed with the intention to modify firewall settings. The rule includes guidance for investigating alerts, addressing false positives, and recommendations for response and remediation actions.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Logon Session
- File
- Network Traffic
ATT&CK Techniques
- T1562
- T1562.004
Created: 2021-07-07