EXPLORE
← Back to Explore
T1021.006

Windows Remote Management

Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user. WinRM is the name of both a Windows service and a protocol that allows a user to interact with a remote system (e.g., run an executable, modify the Registry, modify services).(Citation: Microsoft WinRM) It may be called with the `winrm` command or by any number of programs such as Po...

Windows
22
Detections
3
Sources
5
Threat Actors

BY SOURCE

10sigma9splunk_escu3elastic

PROCEDURES (13)

Lateral4 detections

Auto-extracted: 4 detections for lateral

Script Block3 detections

Auto-extracted: 3 detections for script block

Service2 detections

Auto-extracted: 2 detections for service

Powershell2 detections

Auto-extracted: 2 detections for powershell

Child Process2 detections

Auto-extracted: 2 detections for child process

Script Execution Monitoring2 detections

Auto-extracted: 2 detections for script execution monitoring

Lateral1 detections

Auto-extracted: 1 detections for lateral

Privilege1 detections

Auto-extracted: 1 detections for privilege

Process Creation Monitoring1 detections

Auto-extracted: 1 detections for process creation monitoring

Service1 detections

Auto-extracted: 1 detections for service

Credential1 detections

Auto-extracted: 1 detections for credential

Credential1 detections

Auto-extracted: 1 detections for credential

Lateral1 detections

Auto-extracted: 1 detections for lateral

DETECTIONS (22)