Credential Dumping Via Copy Command From Shadow Copy
This search detects credential dumping using copy command from a shadow copy.
This content is not mapped to any local saved search. Add mapping
Credential Dumping Via Copy Command From Shadow Copy Help
You must be ingesting endpoint data that tracks process activity, including parent-child relationships from your endpoints to populate the Endpoint data model in the Processes node. The command-line arguments are mapped to the "process" field in the Endpoint data model.
Open in Search