heroui logo

PowerShell Domain Enumeration

Splunk Security Content

View Source
Summary
The PowerShell Domain Enumeration analytic rule detects the execution of PowerShell commands commonly used for gathering information about a Windows domain, such as \"get-netdomaintrust\" and \"get-adgroupmember\". This detection utilizes PowerShell Script Block Logging (EventCode=4104) to capture and analyze the complete command that was executed in PowerShell. Detecting such commands is crucial as they often signify that an attacker is conducting reconnaissance to map out the domain and identify important users and groups. Recognizing this behavior can be vital for preventing follow-up attacks, privilege escalation, and unauthorized access to sensitive domain data. The rule outputs statistics including the count of detections, first and last occurrence timestamps, and metadata like the Computer name, EventCode, ScriptBlockText, and User ID involved.
Categories
  • Windows
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1059
  • T1059.001
Created: 2024-11-13