
Summary
This detection rule is designed to identify remote PowerShell sessions via the Windows Remote Management (WinRM) protocol. It monitors the process creation activities for instances of the 'wsmprovhost.exe' executable, which serves as the host process for WinRM. The rule flags any process where 'wsmprovhost.exe' appears either as a parent or child process, indicating an active remote PowerShell session. The detection logic focuses on entries in the process creation log (Windows), making it crucial for security teams to detect unauthorized remote command execution that could signify malicious activities such as lateral movement or remote exploitation. The rule is particularly important for environments leveraging Windows for cloud deployments or where remote management tools may present risk vectors. Users must consider legitimate use cases that may trigger the rule, such as system administrators performing remote management tasks.
Categories
- Windows
- Cloud
- Application
- Infrastructure
Data Sources
- Process
Created: 2019-09-12