
Summary
The 'Crowdstrike Remote Access Tool Execution' rule is designed to detect the execution of commonly used remote access tools, specifically targeting processes associated with such activities to identify potential security breaches or unauthorized access attempts. It utilizes event data from the Crowdstrike platform to analyze process execution logs. The rule is triggered when a process matching known characteristics of remote access software is executed, utilizing attributes such as command line arguments, process hashes, and the associated parent process. This detection is important to proactively identify malicious activities or non-compliance with usage policies associated with remote access software. The rule has a medium severity level, indicating a significant, but not critical, need for investigation when triggered.
Categories
- Endpoint
Data Sources
- Process
- Application Log
- Sensor Health
ATT&CK Techniques
- T1219
Created: 2023-05-04