LoFP LoFP / t1546

t1546

TitleTags
adding new users or groups to the adminsdholder acl is not usual. filter as needed
admin activity
admin or user activity are expected to generate some false positives
changes to the shell profile tend to be noisy, a tuning per your environment will be required.
custom windows error reporting debugger or applications restarted by werfault after a crash.
dell computers on some versions register an event consumer that is known to cause false positives when brightness is changed by the corresponding keyboard button
dell power manager (c:\program files\dell\powermanager\dpmpowerplansetup.exe)
exclude legitimate (vetted) use of wmi event subscription in your network
gpo
legitimate administration activities
legitimate administration and tuning scripts that aim to add functionality to a user powershell session
legitimate administrative use
legitimate administrator sets up autorun keys for legitimate reason
legitimate applications making use of this feature for compatibility reasons
legitimate applications registering their binary from on of the suspicious locations mentioned above (tune it)
legitimate ci/cd automation that requires workflow file modifications may trigger this alert if not properly configured with the necessary permissions. review the workflow configuration and ensure the github_token or pat has the required 'workflows' permission if the modification is intentional.
legitimate custom shim installations will also trigger this rule
legitimate event consumers
legitimate helper added by different programs and the os
legitimate modification of screensaver
legitimate powershell scripts
legitimate software creating script event consumers
legitimate use
legitimate use of the dll.
legitimate use of the profile by developers or administrators
legitimate user shell modification activity.
maybe some system utilities in rare cases use linking keys for backward compatibility
none identified
some organizations may legitimately expose lambda functions for cross-account or anonymous invocation (e.g., custom public apis, integrations, or legacy architectures). validate whether the function owner explicitly intended to make the function publicly invokable. routine ci/cd deployments or iac templates may also temporarily set permissive policies; confirm this is expected behavior before treating it as suspicious.
system administrator creating powershell profile manually
trusted applications for managing calendars and reminders.
unknown
unknown (data set is too small; further testing needed)
user genuinely creates a vb macro for their email