A host is potentially running PowerShell to send HTTP(S) requests (ASIM Web Session schema)

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This rule identifies a web request with a user agent header known to belong PowerShell.
You can add custom Powershell indicating User-Agent headers using a watchlist, for more information refer to the UnusualUserAgents Watchlist.

This analytic rule uses ASIM and supports any built-in or custom source that supports the ASIM WebSession schema (ASIM WebSession Schema)

Attribute Value
Type Analytic Rule
Solution Standalone Content
ID 42436753-9944-4d70-801c-daaa4d19ddd2
Severity Medium
Kind Scheduled
Tactics CommandAndControl, DefenseEvasion, Execution
Techniques T1132, T1140, T1059.001
Required Connectors SquidProxy, Zscaler
Source View on GitHub

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules