Cisco Umbrella - Windows PowerShell User-Agent Detected

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Rule helps to detect Powershell user-agent activity by an unusual process other than a web browser.

Attribute Value
Type Analytic Rule
Solution GitHub Only
ID b12b3dab-d973-45af-b07e-e29bb34d8db9
Severity Medium
Kind Scheduled
Tactics CommandAndControl, DefenseEvasion
Required Connectors CiscoUmbrellaDataConnector
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
Cisco_Umbrella_audit_CL 🔶 ? ?
Cisco_Umbrella_cloudfirewall_CL 🔶 ? ?
Cisco_Umbrella_dlp_CL 🔶 ? ?
Cisco_Umbrella_dns_CL 🔶 ? ?
Cisco_Umbrella_fileevent_CL 🔶 ? ?
Cisco_Umbrella_intrusion_CL 🔶 ? ?
Cisco_Umbrella_ip_CL 🔶 ? ?
Cisco_Umbrella_proxy_CL 🔶 ? ?
Cisco_Umbrella_ravpnlogs_CL 🔶 ? ?
Cisco_Umbrella_ztaflow_CL 🔶 ? ?
Cisco_Umbrella_ztna_CL 🔶 ? ?

Associated Connectors

The following connectors provide data for this content item:

Connector Solution
CiscoUmbrellaDataConnector CiscoUmbrella
CiscoUmbrellaDataConnectorelasticpremium CiscoUmbrella

Solutions: CiscoUmbrella


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules