- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects the use of “sp_procoption” in Microsoft SQL Server, which can be used by attackers to establish persistence by marking stored procedures to automatically execute on server startup.
This rule monitors Windows event logs for SQL Server audit events with ID 33205
that capture the execution of the “sp_procoption” system stored procedure. The detection specifically looks for SQL statements containing EXEC
and where the object_name is sp_procoption
. The sp_procoption stored procedure is used to mark other stored procedures with the “startup” option, which causes SQL Server to automatically execute them when the database service starts. This is a powerful persistence mechanism that attackers can abuse to maintain access or execute malicious code with the privileges of the SQL Server service account. Such activity is rare in most environments and typically only used for legitimate database maintenance that has been thoroughly reviewed.
{{host}}
.