LoFP LoFP / t1555

t1555

TitleTags
administrative activity
administrator or network operator can use this application for automation purposes. please update the filter macros to remove false positives.
applications for password management.
as the script block is a blob of text. false positive may occur with scripts that contain the keyword as a reference or simply use it for detection.
false positive is quite limited. filter is needed
legitimate administration activities
legitimate use
legitimate uses in which users or programs use the ssh service of serv-u for remote command execution
network administrator can use this tool for auditing process.
other browser not listed related to chrome may catch by this rule.
other browser not listed related to firefox may catch by this rule.
the build engine is commonly used by windows developers but use by non-engineers is unusual.
unlikely
users may legitimately access aws systems manager (ssm) parameters using the getparameter, getparameters, or describeparameters api actions with credentials in the request parameters. ensure that the user has a legitimate reason to access the parameters and that the credentials are secured.
verify whether the user identity, user agent, and/or hostname should be using getsecretstring or batchgetsecretvalue apis for the specified secretid. if known behavior is causing false positives, it can be exempted from the rule.