- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects when a non-machine account creates files on remote administrative shares (C$).
This detection monitors Windows event logs for network share access events (Event ID 5145) targeting administrative shares with write access permissions. The detection specifically looks for access to C$ shares with an access mask of 0x2 (write data) while filtering out machine account activity.
Administrative shares like C$ are hidden network shares that provide full access to the system drive. They are typically used by administrators for legitimate system management but are also frequently targeted by attackers for lateral movement. By monitoring for non-machine accounts writing files to these shares, Datadog detects potential malicious file deployment across a network.
{{host}}
where the administrative share access occurred.