- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects attempts to disable PowerShell command history by removing the PSReadLine module.
This rule monitors PowerShell script block logging for commands that remove the PSReadLine module. The PSReadLine module provides command history functionality in PowerShell, storing a record of executed commands that can be accessed via the arrow keys or the Get-History cmdlet.
The query looks for script blocks containing Remove-Module
and psreadline
in the @Event.EventData.Data.ScriptBlockText
field. When attackers execute PowerShell commands for malicious purposes, they often attempt to cover their tracks by disabling command history to prevent forensic analysis of their activities.
Removing the PSReadLine module is a rare operation in normal administrative activity, as command history provides valuable functionality for legitimate users. The deliberate removal of this module indicates an attempt to hide command execution and is a common anti-forensic technique.
{{host}}
to disable command history.PSReadLine
module removal.{{host}}
for signs of lateral movement or privilege escalation attempts such as Event ID 4624
(logons from new IPs), 4672
(admin privileges.granted), 4688
(suspicious process creations), or 4697
(service installations).{{host}}
such as memory dumps or system logs.