heroui logo

GetDomainComputer with PowerShell Script Block

Splunk Security Content

View Source
Summary
The 'GetDomainComputer with PowerShell Script Block' analytic detects the execution of the PowerShell commandlet `Get-DomainComputer` through PowerShell Script Block Logging (EventCode=4104). This command, part of the PowerView toolkit, is typically used to enumerate domain computers, which is a critical step in Active Directory reconnaissance. By monitoring script block execution for this specific command, organizations can identify potential adversary activities aimed at gathering information about the network. If an unauthorized user executes this command, it may indicate an ongoing reconnaissance effort, which poses a risk for further network attacks and lateral movement within the domain. It is essential to enable PowerShell script block logging on relevant endpoints to deploy this analytic effectively, as outlined in the provided documentation.
Categories
  • Windows
  • Endpoint
  • Infrastructure
  • Cloud
Data Sources
  • Pod
  • Script
ATT&CK Techniques
  • T1018
  • T1059.001
Created: 2024-11-13