Suspicious Powershell Commandlet Executed

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This analytic rule detects when a suspicious PowerShell commandlet is executed on a host. Threat actors often use PowerShell to execute commands and scripts to move laterally, escalate privileges, and exfiltrate data.

Attribute Value
Type Analytic Rule
Solution Endpoint Threat Protection Essentials
ID b5153fb3-ada9-4ce4-9131-79c771efb50d
Severity Medium
Status Available
Kind Scheduled
Tactics Execution
Techniques T1059
Required Connectors MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
DeviceEvents ActionType == "PowerShellCommand" ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Endpoint Threat Protection Essentials