
Summary
This rule detects activities related to the enabling of the PowerShell Web Access feature on Windows systems via the Deployment Image Servicing and Management (DISM) command. The enabling of PowerShell Web Access could potentially allow for unauthorized remote access or exploitation. The detection is based on the execution of the DISM tool (`dism.exe`) with specific command-line arguments that indicate an attempt to enable the feature. This includes checking for process creation events where the image used is DISM and the command line explicitly references the enabling of PowerShell Web Access. The detection has a high severity level due to the risks associated with unauthorized remote access capabilities.
Categories
- Windows
- Endpoint
- Application
Data Sources
- Process
- Command
Created: 2024-09-03