- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Classification:
attack
Tactic:
Technique:
Detects modifications of access control lists (ACLs) on critical Windows system folders using PowerShell.
This rule monitors Windows event logs for PowerShell script block execution that modifies access control lists on sensitive Windows directories. Modifying permissions on system folders is uncommon in legitimate administrative scenarios and is often used by attackers to establish persistence, evade defenses, or facilitate privilege escalation. Changes to ACLs on critical system folders can enable unauthorized access to sensitive files, bypass security controls, or allow malicious executables to run from protected locations.
{{host}}
to verify the ACL modification and understand the exact permissions being granted.