- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects the execution of AADInternals PowerShell cmdlets.
This rule monitors PowerShell script block logging for commands that invoke AADInternals cmdlets. AADInternals is a PowerShell module created for testing and exploring Azure Active Directory security. While it has legitimate use cases for security professionals, it contains powerful capabilities that can be misused.
The query searches the @Event.EventData.Data.ScriptBlockText
field for PowerShell script blocks that contain various AADInternals cmdlet patterns. These include cmdlets starting with verbs such as Add-AADInt
, Get-AADInt
, Invoke-AADInt
, and many other variations.
AADInternals provides functionality to interact with Azure AD in ways that can bypass normal security controls. The module includes capabilities for token manipulation, extracting tenant information, password spraying, and other techniques that could lead to unauthorized access. Although security teams might use this tool for legitimate testing, its presence in production environments outside controlled testing activities is suspicious.
{{host}}
.{{host}}
.