
Summary
The "Windows Remote Access Software Hunt" rule is designed to detect the use of unauthorized remote access software within an organization's environment. Utilizing logs from Endpoint Detection and Response (EDR) agents, specifically process execution logs, this rule enables security teams to identify potentially malicious remote access activities that could allow attackers to maintain persistence, exfiltrate data, or further infiltrate the network. The detection logic leverages the Splunk data model for Endpoint Processes and matches against a predefined list of known remote access software. Confirmation of malicious activity prompts further investigation to ensure the software in use is authorized. False positives may occur; thus, refining the analytics based on observed behavior is important to enhance detection fidelity.
Categories
- Endpoint
Data Sources
- Pod
- Process
- Windows Registry
ATT&CK Techniques
- T1219
Created: 2024-11-13