Skip to content

Hide Navigation Hide TOC

Security Software Discovery Via Powershell Script (904e8e61-8edf-4350-b59c-b905fc8e810c)

Detects calls to "get-process" where the output is piped to a "where-object" filter to search for security solution processes. Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud environment. This may include things such as firewall rules and anti-virus

Cluster A Galaxy A Cluster B Galaxy B Level
Security Software Discovery Via Powershell Script (904e8e61-8edf-4350-b59c-b905fc8e810c) Sigma-Rules Security Software Discovery - T1518.001 (cba37adb-d6fb-4610-b069-dd04c0643384) Attack Pattern 1
Software Discovery - T1518 (e3b6daca-e963-4a69-aee6-ed4fd653ad58) Attack Pattern Security Software Discovery - T1518.001 (cba37adb-d6fb-4610-b069-dd04c0643384) Attack Pattern 2