-
Hello everyone, there are several windows process creation rules that try to detect different usages of redirections. Examples are:
I tried to generate event logs using Sysmon that would trigger these rules. Unfortunately, I was not able to do so.
My question now is if I made a mistake during the setup or if Sysmon is simply not capable of generating the expected command line logs. If Sysmon is not capable, I wonder if there are other ways to log process creation command lines that do catch the Thanks in advance for any answers and suggestions! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
Both 4688 and Sysmon EID1 aren't capable of catching those CLI for the simple purpose that the cmd /c "whoami /all > C:\Temp\whoami.txt" will be logged as a single command. |
Beta Was this translation helpful? Give feedback.
Both 4688 and Sysmon EID1 aren't capable of catching those CLI for the simple purpose that the
>
character is considered as a pipe character and actually is piping results from one command to another. The detection using it are focusing on the usage of the "/c" flag before hand. For example.cmd /c "whoami /all > C:\Temp\whoami.txt" will be logged as a single command.