Detection rules › By event
Microsoft-Windows-PowerShell event 4103
Sigma (33)
- AD Groups Or Users Enumeration Using PowerShell - PoshModule
- Alternate PowerShell Hosts - PowerShell Module
- Bad Opsec Powershell Code Artifacts
- Clear PowerShell History - PowerShell Module
- HackTool - Evil-WinRm Execution - PowerShell Module
- Invoke-Obfuscation CLIP+ Launcher - PowerShell Module
- Invoke-Obfuscation COMPRESS OBFUSCATION - PowerShell Module
- Invoke-Obfuscation Obfuscated IEX Invocation - PowerShell Module
- Invoke-Obfuscation RUNDLL LAUNCHER - PowerShell Module
- Invoke-Obfuscation STDIN+ Launcher - PowerShell Module
- Invoke-Obfuscation VAR+ Launcher - PowerShell Module
- Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION - PowerShell Module
- Invoke-Obfuscation Via Stdin - PowerShell Module
- Invoke-Obfuscation Via Use Clip - PowerShell Module
- Invoke-Obfuscation Via Use MSHTA - PowerShell Module
- Invoke-Obfuscation Via Use Rundll32 - PowerShell Module
- Malicious PowerShell Commandlets - PoshModule
- Malicious PowerShell Scripts - PoshModule
- Potential Active Directory Enumeration Using AD Module - PsModule
- Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell Module
- PowerShell Decompress Commands
- PowerShell Get Clipboard
- Remote PowerShell Session (PS Module)
- Suspicious Computer Machine Password by PowerShell
- Suspicious Get Information for SMB Share - PowerShell Module
- Suspicious Get Local Groups Information
- Suspicious Get-ADDBAccount Usage
- Suspicious PowerShell Download - PoshModule
- Suspicious PowerShell Invocations - Generic - PowerShell Module
- Suspicious PowerShell Invocations - Specific - PowerShell Module
- SyncAppvPublishingServer Bypass Powershell Restriction - PS Module
- Use Get-NetTCPConnection - PowerShell Module
- Zip A Folder With PowerShell For Staging In Temp - PowerShell Module