heroui logo

Set Default PowerShell Execution Policy To Unrestricted or Bypass

Splunk Security Content

View Source
Summary
This analytic rule detects modifications to the PowerShell Execution Policy in the Windows registry, specifically changes setting it to 'Unrestricted' or 'Bypass.' These settings can allow the execution of potentially malicious scripts without any limitations, which poses a significant risk as attackers could exploit this to run arbitrary code, leading to further system compromise and possibly privilege escalation. The detection leverages data from several sources, including Sysmon and Windows Event Logs, to monitor relevant registry changes, focusing on the registry path 'Software\Microsoft\Powershell\1\ShellIds\Microsoft.PowerShell.' The rule analyzes the volume of process activity and associated registry modifications to identify suspicious behavior that aligns with these risky changes.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1059
  • T1059.001
Created: 2024-11-13