Detection Of Tools Built By Nirsoft
Description
This search looks for specific command-line arguments that may indicate the execution of tools made by Nirsoft, which are legitimate, but may be abused by attackers.
Content Mapping
This content is not mapped to any local saved search. Add mapping
Help |
---|
Detection Of Tools Built By Nirsoft HelpYou must be ingesting endpoint data that tracks process activity, including parent-child relationships from your endpoints to populate the Endpoint data model in the Processes node. The command-line arguments are mapped to the "process" field in the Endpoint data model. |
Search |
---|
Open in Search |