heroui logo

Windows DISM Install PowerShell Web Access

Splunk Security Content

View Source
Summary
This detection rule identifies the installation of PowerShell Web Access through the Deployment Image Servicing and Management (DISM) tool, specifically by monitoring the execution of `dism.exe` with parameters tied to enabling the WindowsPowerShellWebAccess feature. By leveraging data from Sysmon and Windows Event IDs, the rule helps in spotting a potentially harmful configuration on Windows systems which could allow unauthorized remote command execution via PowerShell. Such a capability, if exploited, may lead to severe security breaches, making the detection highly relevant in safeguarding against unauthorized access.
Categories
  • Windows
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1548.002
Created: 2024-11-13