Azure alerts_for_windows_machines Mappings

For Windows, Azure Defender integrates with Azure services to monitor and protect your Windows-based machines. Security Center presents the alerts and remediation suggestions from all of these services in an easy-to-use format.

Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
alerts_for_windows_machines Alerts for Windows Machines detect partial T1078 Valid Accounts
Comments
This control is able to detect some of this technique's sub-techniques resulting in a Partial Coverage score and consequently an overall score of Partial.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1078.003 Local Accounts
Comments
This control may detect suspicious activity from existing Windows accounts and logons from suspicious IP addresses. The following alerts may be generated: "A logon from a malicious IP has been detected", "A logon from a malicious IP has been detected. [seen multiple times]".
References
    alerts_for_windows_machines Alerts for Windows Machines detect partial T1078.001 Default Accounts
    Comments
    This control may detect suspicious activity from existing Windows accounts and logons from suspicious IP addresses. The following alerts may be generated: "A logon from a malicious IP has been detected", "A logon from a malicious IP has been detected. [seen multiple times]".
    References
      alerts_for_windows_machines Alerts for Windows Machines detect minimal T1059 Command and Scripting Interpreter
      Comments
      This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
      References
      alerts_for_windows_machines Alerts for Windows Machines detect significant T1059.001 PowerShell
      Comments
      This control may detect suspicious usage of PowerShell and the Windows command line. These detections include usage of suspicious arguments, dynamic script construction, and shellcode on the commandline. The following alerts may be generated: "Detected anomalous mix of upper and lower case characters in command-line", "Detected encoded executable in command line data", "Detected obfuscated command line", "Detected suspicious combination of HTA and PowerShell", "Detected suspicious commandline arguments", "Detected suspicious commandline used to start all executables in a directory", "Detected suspicious credentials in commandline", "Dynamic PS script construction", "Suspicious PowerShell Activity Detected", "Suspicious PowerShell cmdlets executed", "Suspicious command execution".
      References
        alerts_for_windows_machines Alerts for Windows Machines detect significant T1059.003 Windows Command Shell
        Comments
        This control may detect suspicious usage of PowerShell and the Windows command line. These detections include usage of suspicious arguments, dynamic script construction, and shellcode on the commandline. The following alerts may be generated: "Detected anomalous mix of upper and lower case characters in command-line", "Detected encoded executable in command line data", "Detected obfuscated command line", "Detected suspicious combination of HTA and PowerShell", "Detected suspicious commandline arguments", "Detected suspicious commandline used to start all executables in a directory", "Detected suspicious credentials in commandline", "Dynamic PS script construction", "Suspicious PowerShell Activity Detected", "Suspicious PowerShell cmdlets executed", "Suspicious command execution".
        References
          alerts_for_windows_machines Alerts for Windows Machines detect partial T1204 User Execution
          Comments
          This control provides detection for one of the two sub-techniques of this technique, Malicious File, resulting in a Partial Coverage score and consequently an overall score of Partial.
          References
          alerts_for_windows_machines Alerts for Windows Machines detect partial T1204.002 Malicious File
          Comments
          This control may detect the usage of a malware dropper and other indicators of a malicious file being executed by the user. The following alerts may be generated: "Detected possible execution of keygen executable", "Detected possible execution of malware dropper", "Detected suspicious file creation".
          References
            alerts_for_windows_machines Alerts for Windows Machines detect minimal T1547 Boot or Logon Autostart Execution
            Comments
            This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
            References
            alerts_for_windows_machines Alerts for Windows Machines detect partial T1547.001 Registry Run Keys / Startup Folder
            Comments
            This control may detect when the Registry is leveraged to gain persistence. The following alerts may be generated: "Windows registry persistence method detected".
            References
              alerts_for_windows_machines Alerts for Windows Machines detect minimal T1136 Create Account
              Comments
              This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
              References
              alerts_for_windows_machines Alerts for Windows Machines detect partial T1136.001 Local Account
              Comments
              This control may detect when an account is created with an account name that closely resembles a standard Windows account or group name. This may be an account created by an attacker to blend into the environment. The following alerts may be generated: "Suspicious Account Creation Detected".
              References
                alerts_for_windows_machines Alerts for Windows Machines detect minimal T1543 Create or Modify System Process
                Comments
                This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
                References
                alerts_for_windows_machines Alerts for Windows Machines detect partial T1543.003 Windows Service
                Comments
                This control may detect when the tscon.exe binary is installed as a service to exploit RDP sessions or when a rare service group is executed under SVCHOST. The following alerts may be generated: "Suspect service installation".
                References
                  alerts_for_windows_machines Alerts for Windows Machines detect minimal T1546 Event Triggered Execution
                  Comments
                  This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
                  References
                  alerts_for_windows_machines Alerts for Windows Machines detect partial T1546.002 Screensaver
                  Comments
                  This control may detect when a suspicious screensaver process is executed, based on the location of the .scr file. Because this detection is based solely on the location of the file, it has been scored as Partial. The following alerts may be generated: "Suspicious Screensaver process executed".
                  References
                    alerts_for_windows_machines Alerts for Windows Machines detect partial T1546.008 Accessibility Features
                    Comments
                    This control may detect when the binary for the sticky keys utility has been replaced, possibly to gain persistence or execution. The following alerts may be generated: "Sticky keys attack detected".
                    References
                      alerts_for_windows_machines Alerts for Windows Machines detect minimal T1548 Abuse Elevation Control Mechanism
                      Comments
                      The only sub-technique scored (Bypass User Account Control) is the only one relevant to Windows.
                      References
                      alerts_for_windows_machines Alerts for Windows Machines detect minimal T1548.002 Bypass User Account Control
                      Comments
                      This control may detect when User Account Control is bypassed by manipulating the Windows registry. There may be other methods to Bypass User Account Control which limits the score to Minimal. The following alerts may be generated: "Detected change to a registry key that can be abused to bypass UAC"
                      References
                        alerts_for_windows_machines Alerts for Windows Machines detect partial T1055 Process Injection
                        Comments
                        This control's Fileless Attack Detection covers all relevant sub-techniques. Detection is periodic at an unknown rate.
                        References
                        alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.001 Dynamic-link Library Injection
                        Comments
                        Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                        References
                          alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.002 Portable Executable Injection
                          Comments
                          Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                          References
                            alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.003 Thread Execution Hijacking
                            Comments
                            Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                            References
                              alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.005 Thread Local Storage
                              Comments
                              Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                              References
                                alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.004 Asynchronous Procedure Call
                                Comments
                                Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                                References
                                  alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.011 Extra Window Memory Injection
                                  Comments
                                  Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                                  References
                                    alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.012 Process Hollowing
                                    Comments
                                    Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                                    References
                                      alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.013 Process Doppelgänging
                                      Comments
                                      Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                                      References
                                        alerts_for_windows_machines Alerts for Windows Machines detect partial T1203 Exploitation for Client Execution
                                        Comments
                                        This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                                        References
                                        alerts_for_windows_machines Alerts for Windows Machines detect partial T1212 Exploitation for Credential Access
                                        Comments
                                        This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                                        References
                                        alerts_for_windows_machines Alerts for Windows Machines detect partial T1211 Exploitation for Defense Evasion
                                        Comments
                                        This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                                        References
                                        alerts_for_windows_machines Alerts for Windows Machines detect partial T1068 Exploitation for Privilege Escalation
                                        Comments
                                        This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                                        References
                                        alerts_for_windows_machines Alerts for Windows Machines detect partial T1210 Exploitation of Remote Services
                                        Comments
                                        This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                                        References
                                        alerts_for_windows_machines Alerts for Windows Machines detect partial T1190 Exploit Public-Facing Application
                                        Comments
                                        This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                                        References
                                        alerts_for_windows_machines Alerts for Windows Machines detect partial T1189 Drive-by Compromise
                                        Comments
                                        This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                                        References
                                        alerts_for_windows_machines Alerts for Windows Machines detect partial T1140 Deobfuscate/Decode Files or Information
                                        Comments
                                        This control may detect decoding of suspicious files by certutil.exe and may detect the presence of various encoding schemes to obfuscate malicious scripts and commandline arguments. The following alerts may be generated: "Suspicious download using Certutil detected", "Suspicious download using Certutil detected [seen multiple times]", "Detected decoding of an executable using built-in certutil.exe tool".
                                        References
                                        alerts_for_windows_machines Alerts for Windows Machines detect minimal T1222 File and Directory Permissions Modification
                                        Comments
                                        This control provides minimal detection for some of this technique's sub-techniques resulting in an overall score of Minimal.
                                        References
                                        alerts_for_windows_machines Alerts for Windows Machines detect minimal T1222.001 Windows File and Directory Permissions Modification
                                        Comments
                                        This control may detect the usage of cacls.exe to modify file and directory permissions. The following alerts may be generated: "Detected suspicious use of Cacls to lower the security state of the system".
                                        References
                                          alerts_for_windows_machines Alerts for Windows Machines detect minimal T1564 Hide Artifacts
                                          Comments
                                          This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
                                          References
                                          alerts_for_windows_machines Alerts for Windows Machines detect partial T1564.003 Hidden Window
                                          Comments
                                          This control may detect usage of the WindowPosition Registry value to hide application windows in non-visible sections of the desktop. The following alerts may be generated: "Suspicious WindowPosition registry value detected".
                                          References
                                            alerts_for_windows_machines Alerts for Windows Machines detect minimal T1562 Impair Defenses
                                            Comments
                                            This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
                                            References
                                            alerts_for_windows_machines Alerts for Windows Machines detect partial T1562.004 Disable or Modify System Firewall
                                            Comments
                                            This control may detect modification of the Windows firewall through use of netsh.exe or using a method that matches a known threat actor. The following alerts may be generated: "Malicious firewall rule created by ZINC server implant [seen multiple times]", "Detected suspicious new firewall rule".
                                            References
                                              alerts_for_windows_machines Alerts for Windows Machines detect partial T1562.001 Disable or Modify Tools
                                              Comments
                                              This control may detect when critical services have been disabled, such as Windows Security Center. This control may also detect when IIS logging has been disabled. The following alerts may be generated: "Detected the disabling of critical services", "Detected actions indicative of disabling and deleting IIS log files".
                                              References
                                                alerts_for_windows_machines Alerts for Windows Machines detect minimal T1070 Indicator Removal on Host
                                                Comments
                                                This control's detection is specific to a minority of this technique's sub-techniques and procedure examples resulting in a Minimal Coverage score and consequently an overall score of Minimal.
                                                References
                                                alerts_for_windows_machines Alerts for Windows Machines detect partial T1070.004 File Deletion
                                                Comments
                                                This control may detect suspicious file cleanup commands and shadow copy deletion activity. The following alerts may be generated: "Detected suspicious file cleanup commands", "Suspicious Volume Shadow Copy Activity".
                                                References
                                                  alerts_for_windows_machines Alerts for Windows Machines detect partial T1070.001 Clear Windows Event Logs
                                                  Comments
                                                  This control may detect when an event log has been cleared or IIS logs have been deleted. The following alerts may be generated: "Detected actions indicative of disabling and deleting IIS log files", "An event log was cleared".
                                                  References
                                                    alerts_for_windows_machines Alerts for Windows Machines detect partial T1112 Modify Registry
                                                    Comments
                                                    This control may detect several methods used to modify the registry for purposes of persistence, privilege elevation, and execution. The following alerts may be generated: "Detected change to a registry key that can be abused to bypass UAC", "Detected enabling of the WDigest UseLogonCredential registry key", "Detected suppression of legal notice displayed to users at logon", "Suspicious WindowPosition registry value detected", "Windows registry persistence method detected".
                                                    References
                                                    alerts_for_windows_machines Alerts for Windows Machines detect minimal T1027 Obfuscated Files or Information
                                                    Comments
                                                    This control may detect usage of VBScript.Encode and base-64 encoding to obfuscate malicious commands and scripts. The following alerts may be generated: "Detected suspicious execution of VBScript.Encode command", "Detected encoded executable in command line data".
                                                    References
                                                    alerts_for_windows_machines Alerts for Windows Machines detect minimal T1218 Signed Binary Proxy Execution
                                                    Comments
                                                    This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
                                                    References
                                                    alerts_for_windows_machines Alerts for Windows Machines detect partial T1218.005 Mshta
                                                    Comments
                                                    This control may detect suspicious usage of Mshta to execute PowerShell and suspicious Rundll32 execution. The following alerts may be generated: "Detected suspicious execution via rundll32.exe", "Detected suspicious combination of HTA and PowerShell".
                                                    References
                                                      alerts_for_windows_machines Alerts for Windows Machines detect partial T1218.011 Rundll32
                                                      Comments
                                                      This control may detect suspicious usage of Mshta to execute PowerShell and suspicious Rundll32 execution. The following alerts may be generated: "Detected suspicious execution via rundll32.exe", "Detected suspicious combination of HTA and PowerShell".
                                                      References
                                                        alerts_for_windows_machines Alerts for Windows Machines detect partial T1110 Brute Force
                                                        Comments
                                                        This control provides detection for some of this technique's sub-techniques and procedure examples resulting in a Partial Coverage score and consequently an overall score of Partial.
                                                        References
                                                        alerts_for_windows_machines Alerts for Windows Machines detect significant T1110.003 Password Spraying
                                                        Comments
                                                        This control may detect successful and failed brute force attempts with logic that factors the IP, time between attempts, and other suspicious activity. The following alerts may be generated: "A logon from a malicious IP has been detected", "A logon from a malicious IP has been detected. [seen multiple times]", "Successful brute force attack", "Suspicious authentication activity".
                                                        References
                                                          alerts_for_windows_machines Alerts for Windows Machines detect significant T1110.001 Password Guessing
                                                          Comments
                                                          This control may detect successful and failed brute force attempts with logic that factors the IP, time between attempts, and other suspicious activity. The following alerts may be generated: "A logon from a malicious IP has been detected", "A logon from a malicious IP has been detected. [seen multiple times]", "Successful brute force attack", "Suspicious authentication activity".
                                                          References
                                                            alerts_for_windows_machines Alerts for Windows Machines detect significant T1110.004 Credential Stuffing
                                                            Comments
                                                            This control may detect successful and failed brute force attempts with logic that factors the IP, time between attempts, and other suspicious activity. The following alerts may be generated: "A logon from a malicious IP has been detected", "A logon from a malicious IP has been detected. [seen multiple times]", "Successful brute force attack", "Suspicious authentication activity".
                                                            References
                                                              alerts_for_windows_machines Alerts for Windows Machines detect minimal T1003 OS Credential Dumping
                                                              Comments
                                                              This control provides detection for a minority of this technique's sub-techniques and procedure examples resulting in a Minimal Coverage score and consequently an overall score of Minimal. Furthermore, its detection capability relies on detecting the usage of specific tools (e.g. sqldumper.exe) further adversely impacting its score.
                                                              References
                                                              alerts_for_windows_machines Alerts for Windows Machines detect minimal T1003.004 LSA Secrets
                                                              Comments
                                                              This control may detect when the registry is modified to allow logon credentials to be stored in clear text in LSA memory. This change allows a threat actor to gain plain text credentials from the host machine. The following alerts may be generated: "Detected enabling of the WDigest UseLogonCredential registry key".
                                                              References
                                                                alerts_for_windows_machines Alerts for Windows Machines detect minimal T1558 Steal or Forge Kerberos Tickets
                                                                Comments
                                                                This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
                                                                References
                                                                alerts_for_windows_machines Alerts for Windows Machines detect partial T1558.001 Golden Ticket
                                                                Comments
                                                                This control may detect commandline parameters consistent with a Kerberos Golden Ticket attack. The following alerts may be generated: "Suspected Kerberos Golden Ticket attack parameters observed".
                                                                References
                                                                  alerts_for_windows_machines Alerts for Windows Machines detect partial T1087 Account Discovery
                                                                  Comments
                                                                  This control provides partial detection for some of this technique's sub-techniques and procedure examples resulting in a Partial Coverage score and consequently an overall score of Partial.
                                                                  References
                                                                  alerts_for_windows_machines Alerts for Windows Machines detect partial T1087.001 Local Account
                                                                  Comments
                                                                  This control may detect when the local administrators group is enumerated or when mulitiple domain accounts are queried. The following alerts may be generated: "Multiple Domain Accounts Queried", "Local Administrators group members were enumerated".
                                                                  References
                                                                    alerts_for_windows_machines Alerts for Windows Machines detect partial T1087.002 Domain Account
                                                                    Comments
                                                                    This control may detect when the local administrators group is enumerated or when mulitiple domain accounts are queried. The following alerts may be generated: "Multiple Domain Accounts Queried", "Local Administrators group members were enumerated".
                                                                    References
                                                                      alerts_for_windows_machines Alerts for Windows Machines detect minimal T1082 System Information Discovery
                                                                      Comments
                                                                      This control may detect local reconnaissance activity specific to using the systeminfo commands. The following alerts may be generated: "Detected possible local reconnaissance activity".
                                                                      References
                                                                      alerts_for_windows_machines Alerts for Windows Machines detect partial T1563 Remote Service Session Hijacking
                                                                      Comments
                                                                      This control provides partial detection for some of this technique's sub-techniques resulting in a Partial Coverage score and consequently an overall score of Partial.
                                                                      References
                                                                      alerts_for_windows_machines Alerts for Windows Machines detect partial T1563.002 RDP Hijacking
                                                                      Comments
                                                                      This control may detect RDP hijacking through use of the tscon.exe binary. The following alerts may be generated: "Suspect integrity level indicative of RDP hijacking", "Suspect service installation".
                                                                      References
                                                                        alerts_for_windows_machines Alerts for Windows Machines detect partial T1105 Ingress Tool Transfer
                                                                        Comments
                                                                        This control may detect usage of malware droppers and creation of suspicious files on the host machine. The following alerts may be generated: "Detected possible execution of malware dropper", "Detected suspicious file creation".
                                                                        References
                                                                        alerts_for_windows_machines Alerts for Windows Machines detect minimal T1048 Exfiltration Over Alternative Protocol
                                                                        Comments
                                                                        This control's detection is specific to a minority of this technique's sub-techniques and procedure examples resulting in a Minimal Coverage score and consequently an overall score of Minimal.
                                                                        References
                                                                        alerts_for_windows_machines Alerts for Windows Machines detect minimal T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol
                                                                        Comments
                                                                        This control may detect suspicious use of the Telegram tool for transferring malicious binaries across hosts. The following alerts may be generated: "Detected potentially suspicious use of Telegram tool".
                                                                        References
                                                                          alerts_for_windows_machines Alerts for Windows Machines detect minimal T1489 Service Stop
                                                                          Comments
                                                                          This control may detect when critical services have been disabled through the usage of specifically net.exe. The following alerts may be generated: "Detected the disabling of critical services".
                                                                          References
                                                                          alerts_for_windows_machines Alerts for Windows Machines detect minimal T1202 Indirect Command Execution
                                                                          Comments
                                                                          This control may detect suspicious use of Pcalua.exe to launch executable code. There are other methods of indirect command execution that this control may not detect. The following alerts may be generated: "Detected suspicious use of Pcalua.exe to launch executable code".
                                                                          References