LoFP LoFP / t1490

t1490

TitleTags
access removal may be a part of normal operations and should be verified before taking action.
admin activities or installing related updates may do a sudden stop to list of services we monitor.
administrator or troubleshooting activities may trigger this alert. investigate the process performing this action to determine if its a legitimate activity.
administrators may modify the boot configuration ignore failure during testing and debugging.
administrators may modify the boot configuration.
administrators may use wbadmin to restore files during approved recovery or testing activities. validate the users and context of the operation and apply additional filters as needed.
administrators within an aws organization structure may legitimately suspend object versioning. ensure that this behavior is not part of a legitimate operation before taking action.
aws administrator legitimately disabling bucket versioning
backup scenarios using the commandline
certain utilities that delete files for disk cleanup or administrators manually removing backup files.
in some cases admin can disable systemrestore on a machine.
it is possible that an aws administrator has legitimately disabled versioning on certain buckets to avoid costs.
landesk ldclient ivanti-psmodule (ps encodedcommand)
legitimate activities
legitimate administrator activity
legitimate administrator deletes shadow copies using operating systems utilities for legitimate reason
legitimate administrators may run these commands
legitimate backup activity from administration scripts and software.
legitimate system maintenance or backup operations may occasionally delete shadow copies. however, this activity should be rare and typically performed through approved administrative tools rather than direct wmic commands. tune and modify the search to fit your environment, enable as ttp.
legitimate usage
network admin can resize the shadowstorage for valid purposes.
planned decommissioning activities or large-scale infrastructure changes may result in legitimate bulk deletion of restore point collections. verify with the user and change management processes whether these deletions are authorized. large-scale migration or cleanup projects should be coordinated and documented to avoid false positives.
restore point collection deletions may be performed by system administrators during routine cleanup or decommissioning activities. verify whether the user and resource should be performing these operations. deletions from unfamiliar users or targeting critical resources should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
unknown
vssadmin.exe and wmic.exe are standard applications shipped with modern versions of windows. they may be used by administrators to legitimately delete old backup copies, although this is typically rare.