Remote System Discovery With Adsisearcher

Remote System Discovery With Adsisearcher

Description

The following analytic utilizes PowerShell Script Block Logging (EventCode=4104) to identify the [Adsisearcher] type accelerator being used to query Active Directory for domain computers. Red Teams and adversaries may leverage [Adsisearcher] to enumerate domain computers for situational awareness and Active Directory Discovery.

   Help

Remote System Discovery With Adsisearcher Help

To successfully implement this analytic, you will need to enable PowerShell Script Block Logging on some or all endpoints. Additional setup here https://docs.splunk.com/Documentation/UBA/5.0.4.1/GetDataIn/AddPowerShell#ConfiguremoduleloggingforPowerShell.

   Search

Open in Search