heroui logo

WinEvent Windows Task Scheduler Event Action Started

Splunk Security Content

View Source
Summary
This analytic rule detects the execution of tasks registered in Windows Task Scheduler by monitoring specific event IDs (200 for action started and 201 for action completed) within the Task Scheduler logs. The rule is particularly significant for Security Operations Centers (SOCs) as it helps identify potentially suspicious or unauthorized task executions, which may indicate malicious activities such as persistent access or the execution of harmful payloads. By tracking these events, organizations can uncover evasive techniques used by attackers to maintain footholds within the environment, thereby enabling a proactive approach to incident response. Implementing this rule requires collecting Task Scheduler logs and filtering based on actionable insights while also acknowledging that false positives may occur due to legitimate scheduled task executions.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1053.005
Created: 2024-11-13