
Summary
This rule detects the use of the PowerShell cmdlet Reset-ComputerMachinePassword, which is commonly utilized to reset the computer account password for machines in a domain. While this is a legitimate administrative function, its invocation can also indicate potential malicious activity, especially if done without proper authorization. The reset of a machine's password could allow an attacker to gain unauthorized access to network resources, infiltrate systems, and potentially lead to broader attacks on the environment, such as privilege escalation or lateral movement. Therefore, monitoring for commands associated with password resets is crucial for maintaining a secure environment and mitigating risks associated with unauthorized authentication operations. The detection logic looks for any instances of the cmdlet execution within PowerShell context logs and flags them for further investigation. If these events are triggered, it is recommended to verify the legitimacy of the action against normal administrative workflows.
Categories
- Windows
- Endpoint
Data Sources
- Script
- Logon Session
- Application Log
Created: 2022-02-21