LoFP LoFP / t1134

t1134

TitleTags
administrative activity
anti-virus
break-glass admin tooling, security scanners, or approved controllers that legitimately use impersonation with privileged targets may match if not covered by exclusions. map expected callers and expand `not user.name` filters as needed for your environment.
commandlines containing components like cmd accidentally
false positives may be generated by administrators installing benign applications using run-as/elevation.
jobs and services started with cmd
migration of an account into a new domain
monitoring activity
no false positives have been identified at this time.
scripts and administrative tools used in the monitored environment
unknown
unlikely