heroui logo

Clear PowerShell History - PowerShell Module

Sigma Rules

View Source
Summary
This detection rule is designed to identify activities related to clearing PowerShell command history, which can be indicative of an attacker attempting to evade detection after executing malicious commands. The detection focuses on specific keywords and commands that are associated with clearing or modifying PowerShell history behaviors in Windows environments. It specifically looks for various commands such as `Remove-Item`, `del`, and specific calls to `Set-PSReadlineOption` that suppress history saving. Given the nature of the detection, proper alerting should take into account potential false positives from legitimate scripts that may also clear history as a normal function. The rule conditions are triggered if any single keyword from the defined payload is detected, contributing to an alert being raised for further investigation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Command
  • Application Log
Created: 2019-10-25