Windows PowerShell web access installation using PsScript

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects the installation and configuration of Windows PowerShell Web Access, which can be used by attackers to establish a web-based PowerShell remote access backdoor.

Strategy

This rule monitors Windows event logs for PowerShell script block executions that include commands related to PowerShell Web Access setup and configuration. The detection targets script blocks containing Install-WindowsFeature combined with WindowsPowerShellWebAccess, Install-PswaWebApplication, or Add-PswaAuthorizationRule commands. Additionally, it looks for authorization parameter settings like -UserName * or -ComputerName *. PowerShell Web Access provides a web-based PowerShell interface that allows users to run PowerShell commands remotely through a web browser.

Triage & Response

  • Examine the complete PowerShell script block content to understand the full scope of the PowerShell Web Access configuration on {{host}}.
  • Verify if the PowerShell Web Access installation was authorized and part of a documented change.
  • Review the authorization rules that were created to determine which users and computers were granted access.
  • If unauthorized, uninstall the PowerShell Web Access feature using Uninstall-WindowsFeature -Name WindowsPowerShellWebAccess.
  • Review the authentication events for any users who may have accessed the system through PowerShell Web Access.