
Summary
The detection rule focuses on tracking the execution of the `Find-LocalAdminAccess` cmdlet through PowerShell Script Block Logging (EventCode=4104). This cmdlet is integral to PowerView, a toolkit utilized for Windows domain enumeration. By monitoring the invocation of `Find-LocalAdminAccess`, security teams can identify potential malicious activities where adversaries might be looking to exploit their current user privileges for lateral movement or privilege escalation within a network. The rule highlights that if detected, this type of activity may point to attackers gaining access to other systems, thereby risking the exposure of sensitive information. To implement the detection, operational logs for PowerShell must be logged and indexed appropriately to ensure accurate monitoring. The analytic may yield false positives through legitimate administrator activities, particularly using PowerSploit tools, necessitating careful analysis of the context surrounding the events.
Categories
- Windows
- Endpoint
Data Sources
- Pod
- Process
- Application Log
ATT&CK Techniques
- T1087
- T1087.002
Created: 2024-11-13