heroui logo

Windows File and Directory Permissions Enable Inheritance

Splunk Security Content

View Source
Summary
This security analytic is designed to detect the enabling of permission inheritance on files or directories in a Windows environment, specifically monitoring for the use of the ICACLS command with the /inheritance:e flag. This flag re-enables the inheritance of permissions from a parent directory, which can be both a legitimate administrative action or a tactic used by malicious actors to lower restrictions on sensitive files. The detection logic captures instances where processes such as 'icacls.exe', 'cacls.exe', and 'xcacls.exe' are executed with the inheritance flag, focusing on the command-line arguments to identify modifications in access controls. By tracking these events, security teams can spot potential unauthorized exposure of sensitive data resulting from the alteration of permissions.
Categories
  • Windows
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1222.001
Created: 2024-12-13