You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Website: Add Powershell commands to queries.yml and standard query library. (#25972)
Changes:
- Added powershell commands to windows queries in queries.yml and
windows policies in the standard query library.
- Updated code blocks on the vital details, policy details, and query
details pages to have a tab switcher to switch to view PowerShell
commands.
---------
Co-authored-by: Mike McNeil <[email protected]>
if ($exeName -ieq "regsvr32" -and $item -imatch "http") {
1072
+
$found = $true
1073
+
break
1074
+
}
1075
+
}
1076
+
1077
+
1078
+
if (-not $found) {
1079
+
Write-Output "1"
1080
+
}
972
1081
tags: malware, hunting
973
1082
platform: windows
974
1083
contributors: kswagler-rh
@@ -1072,6 +1181,14 @@ spec:
1072
1181
query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\InactivityTimeoutSecs' AND CAST(data as INTEGER) <= 1800;
1073
1182
description: "Checks if the screen lock is enabled and configured to lock the system within 30 minutes or less."
1074
1183
resolution: "Contact your IT administrator to enable the Interactive Logon: Machine inactivity limit setting with a value of 1800 seconds or lower."
query: SELECT 1 FROM registry WHERE path LIKE 'HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\DomainProfile\EnableFirewall' AND CAST(data as integer) = 1;
description: "Checks if a Group Policy configures the computer to enable the domain profile for Windows Firewall. The domain profile applies to networks where the host system can authenticate to a domain controller. Some auditors requires that this setting is configured by a Group Policy."
1788
1913
resolution: "Contact your IT administrator to ensure your computer is receiving a Group Policy that enables the domain profile for Windows Firewall."
1789
1914
platforms: Windows
@@ -1796,6 +1921,14 @@ kind: policy
1796
1921
spec:
1797
1922
name: Firewall enabled, private profile (Windows)
1798
1923
query: SELECT 1 FROM registry WHERE path LIKE 'HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile\EnableFirewall' AND CAST(data as integer) = 1;
description: "Checks if a Group Policy configures the computer to enable the private profile for Windows Firewall. The private profile applies to networks where the host system is connected to a private or home network. Some auditors requires that this setting is configured by a Group Policy."
1800
1933
resolution: "Contact your IT administrator to ensure your computer is receiving a Group Policy that enables the private profile for Windows Firewall."
1801
1934
platforms: Windows
@@ -1808,6 +1941,14 @@ kind: policy
1808
1941
spec:
1809
1942
name: Firewall enabled, public profile (Windows)
1810
1943
query: SELECT 1 FROM registry WHERE path LIKE 'HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PublicProfile\EnableFirewall' AND CAST(data as integer) = 1;
description: "Checks if a Group Policy configures the computer to enable the public profile for Windows Firewall. The public profile applies to networks where the host system is connected to public networks such as Wi-Fi hotspots at coffee shops and airports. Some auditors requires that this setting is configured by a Group Policy."
1812
1953
resolution: "Contact your IT administrator to ensure your computer is receiving a Group Policy that enables the public profile for Windows Firewall."
1813
1954
platforms: Windows
@@ -1820,6 +1961,13 @@ kind: policy
1820
1961
spec:
1821
1962
name: SMBv1 client driver disabled (Windows)
1822
1963
query: SELECT 1 FROM windows_optional_features WHERE name = 'SMB1Protocol-Client' AND state != 1;
description: "Checks that the SMBv1 server is disabled."
1836
1991
resolution: "Contact your IT administrator to discuss disabling SMBv1 on your system."
1837
1992
platforms: Windows
@@ -1844,6 +1999,14 @@ kind: policy
1844
1999
spec:
1845
2000
name: Link-Local Multicast Name Resolution (LLMNR) disabled (Windows)
1846
2001
query: SELECT 1 FROM registry WHERE path LIKE 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient\EnableMulticast' AND CAST(data as integer) = 0;
description: "Checks if a Group Policy configures the computer to disable LLMNR. Disabling LLMNR can prevent malicious actors from gaining access to the computer's credentials. Some auditors require that this setting is configured by a Group Policy."
1848
2011
resolution: "Contact your IT administrator to ensure your computer is receiving a Group Policy that disables LLMNR on your system."
1849
2012
platforms: Windows
@@ -1856,6 +2019,14 @@ kind: policy
1856
2019
spec:
1857
2020
name: Automatic updates enabled (Windows)
1858
2021
query: SELECT 1 FROM registry WHERE path LIKE 'HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\AU\NoAutoUpdate' AND CAST(data as integer) = 0;
description: "Checks if a Group Policy configures the computer to enable Automatic Updates. When enabled, the computer downloads and installs security and other important updates automatically. Some auditors require that this setting is configured by a Group Policy."
1860
2031
resolution: "Contact your IT administrator to ensure your computer is receiving a Group policy that enables Automatic Updates."
0 commit comments