Potential Suspicious Windows Feature Enabled

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects usage of the built-in PowerShell cmdlet "Enable-WindowsOptionalFeature" used as a Deployment Image Servicing and Management tool. Similar to DISM.exe, this cmdlet is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "PowerShell Script Block Logged" AND (SCRIPTEXECUTED contains "Enable-WindowsOptionalFeature" AND SCRIPTEXECUTED contains "-Online" AND SCRIPTEXECUTED contains "-FeatureName") AND SCRIPTEXECUTED contains "TelnetServer,Internet-Explorer-Optional-amd64,TFTP,SMB1Protocol,Client-ProjFS,Microsoft-Windows-Subsystem-Linux" select Action1.HOSTNAME,Action1.MESSAGE,Action1.SCRIPTEXECUTED

Detection

Execution Mode

realtime

Log Sources

Windows

Author

frack113