Does anyone have a sample rule they can share with me to track EID 7045 windows events to monitor new services?
Also any sample rules or pointers you can provide for this detection would be a ton of help.
- Randomized powershell executables - hash is poweshell.exe but file name is different.
Best answer by jstoner
Here is a starter rule that would track new services being created. I'm grouping by the host but clearly there is a lot of additional tweaking that could be done to view by user or service as well as using watchlists(reference lists) or tying into other process executions.
Here is a starter rule that would track new services being created. I'm grouping by the host but clearly there is a lot of additional tweaking that could be done to view by user or service as well as using watchlists(reference lists) or tying into other process executions.