Windows OpenSSH server listening on socket

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects when Windows OpenSSH server starts listening on network sockets, potentially indicating unauthorized remote access establishment.

Strategy

This rule monitors Windows OpenSSH server events where @evt.id is 4 from the sshd process when @Event.EventData.Data.payload contains Server listening on messages. While OpenSSH can be legitimately installed on Windows systems for remote administration, unexpected SSH server activation may indicate attacker-installed persistence mechanisms or unauthorized remote access capabilities. Attackers often deploy SSH servers to maintain persistent access to compromised systems and facilitate lateral movement within the network.

Triage and response

  • Verify if the OpenSSH server installation and activation on {{host}} was authorized and follows organizational IT policies for remote access tools.
  • Check the network interface and port configuration to determine if the SSH server is accessible from external networks or only internal systems.
  • Review system installation logs and recent administrative activities to identify who installed or configured the OpenSSH server.
  • Examine SSH server configuration files for any unusual settings, authorized keys, or access controls that may indicate malicious configuration.
  • Monitor for subsequent SSH connection attempts to determine if the server is being used for legitimate administration or unauthorized access.