Credential Dumping Via Copy Command From Shadow Copy
This search detects credential dumping using copy command from a shadow copy.
Credential Dumping Via Copy Command From Shadow Copy Help
You must be ingesting endpoint data that tracks process activity, including parent-child relationships from your endpoints to populate the Endpoint data model in the Processes node. The command-line arguments are mapped to the "process" field in the Endpoint data model.
Open in Search