CyberArkEPM - Uncommon Windows process started from System folder

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Detects when uncommon windows proccess is started from System folder.

Attribute Value
Type Analytic Rule
Solution CyberArkEPM
ID 16b940d2-aaf8-4eaa-a5e1-05df5f5c3d43
Severity Medium
Kind Scheduled
Tactics Execution, DefenseEvasion
Techniques T1204, T1036
Required Connectors CyberArkEPM
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
CyberArkEPM_CL 🔶 ? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to CyberArkEPM