ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

New PowerShell Remoting Attempt

Risk Factors

PowerShell Remoting is normally only available to local administrators, however if an attacker gains remote access to a server, the amount of potential damage depends on the privileges available on the compromised server.

The system might change the risk score for this detection.

Category

Lateral Movement
Detection diagram
Next in Lateral Movement: New RDP Connection to a Domain Controller

Attack Background

PowerShell is a built-in Windows command line shell and scripting language that is enabled by default on most enterprise machines. An attacker who gains remote access to PowerShell on a single computer on your network can run malicious code without installing any files. Note that WSMAN protocol activity is typically associated with PowerShell Remoting.

Mitigation Options

Disable PowerShell Remoting on devices where remote access is unnecessary

Complete all remote administration tasks from a dedicated management host

Create a group policy object (GPO) to only allow remote administration from trusted groups

Disable NTLM authentication, which is less secure than Kerberos

Disable HTTP handler and route traffic securely through HTTPS

MITRE ATT&CK ID

Associated content

Reveal(x) vs. Five Top Microsoft Exploits — ExtraHop

ExtraHop Reveal(x) gives users comprehensive visibility into attacks on Microsoft environments. Here’s how it defends against five major Microsoft exploits.

Blog

ExtraHop® Unveils Advanced Network Detection Capabilities to Stop Malicious PowerShell Attacks — ExtraHop

ExtraHop exposes hidden commands to detect and respond to lateral movement

News

Malware-Free Attacks Demand Network Visibility — ExtraHop

Discover why network detection and response (NDR) is key to defending against the evolving threats highlighted in the 2024 CrowdStrike Global Threat Report.

Blog

Announcing The Forrester Wave™: Network Analysis And Visibility Solutions, Q4 2025

Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.

Report

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response — ExtraHop

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response

News

Detections

Visit this resource for more information.

Docs

The 2025 ExtraHop Global Threat Landscape Report: The Alarming Reality of Threat Actor Dwell Time and Deeper Network Access — ExtraHop

This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.

Blog

ExtraHop RevealX MITRE ATT&CK Coverage 2024 — ExtraHop

Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.

Blog

MITRE ATT&CK - Network Detection & Response with RevealX — ExtraHop

Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.

External
Periodic Table of Use Cases

What else can RevealX do for you?