LoFP LoFP / t1021.002

t1021.002

TitleTags
a file server may experience high-demand loads that could cause this analytic to trigger.
administrators
administrators can leverage psexec for accessing remote systems and might pass `accepteula` as an argument if they are running this tool for the first time. however, it is not likely that you'd see multiple occurrences of this event on a machine
although uncommon, administrators may leverage impackets tools to start a process on remote systems for system administration or automation use cases.
connections from local or private ip addresses to smb shares without signing or encryption enabled for older systems or misconfigured environments. apply additional tuning as needed.
domain controllers acting as printer servers too? :)
domain controllers that are sometimes, commonly although should not be, acting as printer servers too
false positives may occur if a user called rundll32 from cli with no options
false positives should be rare, investigate matches and apply additional filters as needed.
legitimate activity by administrators and scripts
legitimate administrator activity
linux hostnames composed of 16 characters.
possible, different agents with a 8 character binary and a 4, 8 or 16 character service name
puas can be used in a legitimate manner. therefore, some of the named pipes identified and added may cause false positives. filter by process name or pipe name to reduce false positives.
some false positives may occur from rmm software used in your environment. apply filters based on known legitimate rmm software in your environment to reduce false positives.
system administrators may use looks like psexec for troubleshooting or administrations tasks. however, this will typically come only from certain users and certain systems that can be added to an allow list.
unknown
update the excluded named pipe to filter out any newly observed legit named pipe
vulnerability scanners or system administration tools may also trigger this detection. filter as needed.