• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

New PowerShell Remoting Attempt

Risk Factors

PowerShell Remoting is normally only available to local administrators, however if an attacker gains remote access to a server, the amount of potential damage depends on the privileges available on the compromised server.

The system might change the risk score for this detection.

Kill Chain

Lateral Movement

Risk Score

56

Detection diagram
Next in Lateral Movement: New RDP Connection to a Domain Controller

Attack Background

PowerShell is a built-in Windows command line shell and scripting language that is enabled by default on most enterprise machines. An attacker who gains remote access to PowerShell on a single computer on your network can run malicious code without installing any files. Note that WSMAN protocol activity is typically associated with PowerShell Remoting.

Mitigation Options

Disable PowerShell Remoting on devices where remote access is unnecessary

Complete all remote administration tasks from a dedicated management host

Create a group policy object (GPO) to only allow remote administration from trusted groups

Disable NTLM authentication, which is less secure than Kerberos

Disable HTTP handler and route traffic securely through HTTPS

MITRE ATT&CK ID

What else can RevealX do for you?