- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects attempts to delete Windows Volume Shadow Copies using PowerShell with WMI commands.
This detection monitors PowerShell event logs for commands that use WMI objects targeting Win32_ShadowCopy with deletion operations. The detection looks for event data containing both “Get-WmiObject” and “Win32_ShadowCopy” strings along with either “Delete()” or “Remove-WmiObject” in the PowerShell script block logging.
Volume Shadow Copies provide point-in-time snapshots that allow for backup and recovery of files. Threat actors, particularly in ransomware attacks, often target these snapshots to prevent recovery options. By monitoring for commands that explicitly target and delete these shadow copies, Datadog detects potential data destruction activities.
{{host}}
system where shadow copies were deleted using PowerShell and WMI.