<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD Enumeration Powershell in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ad-enumeration-powershell/m-p/1224835#M8132</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/308232"&gt;@aspatil&lt;/a&gt;&amp;nbsp;It's required enable the "powershell logging in windows"??&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 26 Mar 2025 18:18:48 GMT</pubDate>
    <dc:creator>tlmarques</dc:creator>
    <dc:date>2025-03-26T18:18:48Z</dc:date>
    <item>
      <title>AD Enumeration Powershell</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ad-enumeration-powershell/m-p/1224785#M8128</link>
      <description>&lt;P class="" data-start="123" data-end="137"&gt;Hi everyone,&lt;/P&gt;
&lt;P class="" data-start="139" data-end="290"&gt;I need your help to understand whether it's possible to see which commands users are running in PowerShell—for example, Active Directory enumeration.&lt;/P&gt;
&lt;P class="" data-start="292" data-end="516"&gt;I know that Cortex blocks malicious scripts like &lt;CODE data-start="341" data-end="352"&gt;dumpcreds&lt;/CODE&gt; and &lt;CODE data-start="357" data-end="369"&gt;BloodHound&lt;/CODE&gt;, but my question is: how can I receive an alert or monitor the execution of commands like &lt;CODE data-start="460" data-end="476"&gt;"Get-ADUser *"&lt;/CODE&gt; or &lt;CODE data-start="480" data-end="506"&gt;"Get-ADDomainController"&lt;/CODE&gt; in XQL?&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2025 12:30:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ad-enumeration-powershell/m-p/1224785#M8128</guid>
      <dc:creator>tlmarques</dc:creator>
      <dc:date>2025-03-26T12:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: AD Enumeration Powershell</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ad-enumeration-powershell/m-p/1224809#M8130</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/307134"&gt;@tlmarques&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;You can use below query as a sample and Create BIOC.&lt;/P&gt;
&lt;P&gt;dataset = xdr_data&lt;BR /&gt;| filter event_type = ENUM.PROCESS&lt;BR /&gt;| filter event_sub_type = ENUM.PROCESS_START&lt;BR /&gt;| filter actor_process_image_name = "powershell.exe"&lt;BR /&gt;| filter actor_process_command_line contains "Get-ADUser" &lt;BR /&gt;or actor_process_command_line contains "Get-ADDomainController"&lt;BR /&gt;or actor_process_command_line contains "Get-ADComputer"&lt;BR /&gt;or actor_process_command_line contains "Get-ADGroup"&lt;BR /&gt;| fields _time, agent_hostname, actor_effective_username, actor_process_command_line&lt;BR /&gt;| sort desc _time&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once BIOC is created, based on the alert name you can configure the notification.&lt;/P&gt;
&lt;P&gt;Please ensure&amp;nbsp; PowerShell Logging in Windows: Ensure PowerShell Script Block Logging is enabled via Group Policy (Event ID 4104 in Windows Event Logs). This will improve visibility.&lt;/P&gt;
&lt;P&gt;Cortex XDR Analytics: You can also leverage Behavioral Analytics for abnormal PowerShell usage patterns.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you feel this has answered your query, please let us know by clicking like and&amp;nbsp; on "mark this as a Solution". Thank you.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2025 14:52:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ad-enumeration-powershell/m-p/1224809#M8130</guid>
      <dc:creator>aspatil</dc:creator>
      <dc:date>2025-03-26T14:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: AD Enumeration Powershell</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ad-enumeration-powershell/m-p/1224835#M8132</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/308232"&gt;@aspatil&lt;/a&gt;&amp;nbsp;It's required enable the "powershell logging in windows"??&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2025 18:18:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ad-enumeration-powershell/m-p/1224835#M8132</guid>
      <dc:creator>tlmarques</dc:creator>
      <dc:date>2025-03-26T18:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: AD Enumeration Powershell</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ad-enumeration-powershell/m-p/1224882#M8133</link>
      <description>&lt;P&gt;Yes, it ensures that we have the required visibility.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 05:21:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ad-enumeration-powershell/m-p/1224882#M8133</guid>
      <dc:creator>aspatil</dc:creator>
      <dc:date>2025-03-27T05:21:52Z</dc:date>
    </item>
  </channel>
</rss>

