
Summary
This analytic rule identifies the utilization of the Windows PowerShell 'RemoteSigned' execution policy, which allows locally created scripts to run without restrictions. By monitoring command-line executions that reference 'remotesigned' and '-File', it flags potentially unsafe activities that could indicate an attacker is executing unauthorized scripts. Such actions pose a risk for code execution, privilege escalation, or even persistence within the environment, making it crucial to detect and respond to these activities.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Script
- Process
ATT&CK Techniques
- T1059.001
- T1059
Created: 2024-11-13