Windows PowerShell Set-Acl on folder

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects modifications of access control lists (ACLs) on critical Windows system folders using PowerShell.

Strategy

This rule monitors Windows event logs for PowerShell script block execution that modifies access control lists on sensitive Windows directories. Modifying permissions on system folders is uncommon in legitimate administrative scenarios and is often used by attackers to establish persistence, evade defenses, or facilitate privilege escalation. Changes to ACLs on critical system folders can enable unauthorized access to sensitive files, bypass security controls, or allow malicious executables to run from protected locations.

Triage & Response

  • Examine the PowerShell script block content on {{host}} to verify the ACL modification and understand the exact permissions being granted.
  • Identify the user account that executed the PowerShell command and determine if this was an authorized administrative action.
  • Review which specific folder within the Windows directory had its permissions modified.
  • Investigate for other suspicious PowerShell activities on the system before and after the ACL modification.
  • Look for evidence of actual exploitation of the modified permissions, such as file writes or executable creation in the affected directories.
  • Determine if similar ACL modifications have occurred on other systems in the environment.