LoFP LoFP / t1021.006

t1021.006

TitleTags
administrator or power user can execute command shell or script remotely using winrm.
administrator or power user can execute command shell or script to access windows remote management.
administrators may leverage winrm and `enter-pssession` for administrative and troubleshooting tasks. this activity is usually limited to a small set of hosts or users. in certain environments, tuning may not be possible.
administrators may leverage winrm and `invoke-command` to start a process on remote systems for system administration or automation use cases. however, this activity is usually limited to a small set of hosts or users.
administrators may leverage winrm and winrs to start a process on remote systems, but this activity is usually limited to a small set of hosts or users.
legitimate applications may spawn powershell as a child process of the the identified processes. filter as needed.
legitimate applications may trigger this behavior, filter as needed.
legitimate script
legitimate usage of remote powershell, e.g. for monitoring purposes.
legitimate usage of remote powershell, e.g. remote administration and monitoring.
legitimate use of winrm within the organization
legitimate use remote powershell sessions
network service user name of a not-covered localization
unknown
unlikely
user and network administrator may used this function to add trusted host.