
Summary
This detection rule identifies the installation of PowerShell Web Access through the Deployment Image Servicing and Management (DISM) tool, specifically by monitoring the execution of `dism.exe` with parameters tied to enabling the WindowsPowerShellWebAccess feature. By leveraging data from Sysmon and Windows Event IDs, the rule helps in spotting a potentially harmful configuration on Windows systems which could allow unauthorized remote command execution via PowerShell. Such a capability, if exploited, may lead to severe security breaches, making the detection highly relevant in safeguarding against unauthorized access.
Categories
- Windows
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1548.002
Created: 2024-11-13