Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
|
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Medium |
Description
Detects an interactive AT scheduled task, which may be used as a form of privilege escalation.
Attacker's Goals
Attackers may attempt to use the command to gain persistence on the endpoint using recurring tasks.
Investigative actions
Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.