- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects suspicious execution of xp_cmdshell in Microsoft SQL Server to run system commands.
This rule monitors Windows event logs for Microsoft SQL Server audit events related to xp_cmdshell usage. It specifically looks for event ID 33205
from MSSQL providers where logs contain both “xp_cmdshell” and “EXEC” strings. The xp_cmdshell extended stored procedure allows SQL Server to execute operating system commands through the SQL Server service account, which is frequently abused by attackers who have gained access to SQL Server instances. This functionality allows attackers to run arbitrary commands on the database server, potentially leading to full system compromise, data theft, or lateral movement through the environment.
{{host}}
to verify the xp_cmdshell execution and identify the specific commands executed.