Detection rules › By eventMicrosoft-Windows-Sysmon event 204 detection rules reference this event. View event page.Sigma (3)Suspicious Encoded Scripts in a WMI Consumer severity high T1047, T1546.003 Suspicious Scripting in a WMI Consumer severity high T1059.005 WMI Event Subscription severity medium T1546.003 Splunk (1)Detect WMI Event Subscription Persistence T1546.003