heroui logo

Windows Powershell RemoteSigned File

Splunk Security Content

View Source
Summary
This analytic rule identifies the utilization of the Windows PowerShell 'RemoteSigned' execution policy, which allows locally created scripts to run without restrictions. By monitoring command-line executions that reference 'remotesigned' and '-File', it flags potentially unsafe activities that could indicate an attacker is executing unauthorized scripts. Such actions pose a risk for code execution, privilege escalation, or even persistence within the environment, making it crucial to detect and respond to these activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Script
  • Process
ATT&CK Techniques
  • T1059.001
  • T1059
Created: 2024-11-13