Credential Dumping Via Copy Command From Shadow Copy

Description

This search detects credential dumping using copy command from a shadow copy.

   Help

Credential Dumping Via Copy Command From Shadow Copy Help

You must be ingesting endpoint data that tracks process activity, including parent-child relationships from your endpoints to populate the Endpoint data model in the Processes node. The command-line arguments are mapped to the "process" field in the Endpoint data model.

   Search

Open in Search