Skip to content

Commit 911ebe6

Browse files
authored
Update remote_monitoring_and_management_software.yml
1 parent ef5eca5 commit 911ebe6

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

stories/remote_monitoring_and_management_software.yml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,12 @@ id: e405907a-273c-41c9-928c-768c9355c1f7
33
version: 1
44
date: '2035-01-14'
55
author: Steven Dick
6-
description: Fortify your remote access and unapproved software monitoring with searches that monitor for and help you investigate the use of unappoved or malicious remote monitoring and management softwares (RMM).
7-
narrative: Attackers can leverage a variety of 3rd party software to establish unapproved remote access or c2 channels to an enterprise network. Common techniques include the installation of these remote access software via channels via phishing, scam, or driveby malware compromise situations. While this Analytic Story is not a comprehensive listing of all RMM software it provides a useful starting point for well known indicators.
6+
description: |-
7+
Fortify your remote access and unapproved software monitoring with searches that monitor for and help you investigate the use of unappoved or malicious remote monitoring and management softwares (RMM).
8+
narrative: |-
9+
Attackers can leverage a variety of 3rd party software to establish unapproved remote access or c2 channels to an enterprise network. Common techniques include the installation of these remote access software via channels via phishing, scam, or driveby malware compromise situations. While this Analytic Story is not a comprehensive listing of all RMM software it provides a useful starting point for well known indicators.
10+
11+
Be sure to leverage the "RMM Software Tracking" dashboard provided with this story for a convienent way to vizualize RMM usage in your enviroment.
812
references:
913
- https://attack.mitre.org/techniques/T1219/
1014
- https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/
@@ -17,4 +21,4 @@ tags:
1721
- Splunk Enterprise
1822
- Splunk Enterprise Security
1923
- Splunk Cloud
20-
usecase: Security Monitoring
24+
usecase: Security Monitoring

0 commit comments

Comments
 (0)