
Summary
This detection rule aims to identify the installation of an Exchange Transport Agent in a Windows environment, which is an important component of Microsoft Exchange Server that can be manipulated for persistence by threat actors. The detection leverages the `Install-TransportAgent` PowerShell cmdlet, which is typically used to install such agents. Given that these installations can also be performed legitimately by administrators, the rule is designed to filter out false positives by requiring specific indicators such as the `AssemblyPath`. The rule is part of efforts to enhance the monitoring capabilities of system administrators against potential persistence threats involving Microsoft Exchange Server, thereby ensuring a more secure environment.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
Created: 2021-06-08