
Summary
This detection rule focuses on identifying remote PowerShell sessions initiated from a system to a remote server. It specifically looks for instances of 'wsmprovhost.exe', which is the Windows Management Instrumentation (WMI) host service, and a designated hostname 'ServerRemoteHost'. The logic applied here uses a simple condition structure where the presence of both elements is necessary to trigger the detection. Due to the nature of PowerShell and its legitimate use in administrative tasks, this rule acknowledges the potential for false positives arising from valid remote PowerShell session usage, thereby designating the rule's severity level as low. This rule is significant for detecting potential lateral movement and execution of PowerShell commands which may hint at malicious activities or compromise attempts within the network. The author of this rule, Roberto Rodriguez, has provided a reference that further elaborates on remote PowerShell execution, indicating a proactive approach to monitoring such activities and enhancing the security posture of the Windows environment.
Categories
- Windows
- Network
- Cloud
Data Sources
- Process
- Logon Session
- Network Traffic
Created: 2019-08-10