PrintSpoofer Detection
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects PrintSpoofer, an utility that escalates user privileges on Windows 10, Windows Server 2016 and 2019.
Severity
Critical
Rule Requirement
Criteria
Action1: actionname = "Process started" AND ((PROCESSNAME endswith "PrintSpoofer.exe" OR PROCESSNAME contains "Spoof.uxe.tmp")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows


