Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
1 Hour |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
Identity Analytics |
Detector Tags |
Microsoft SCCM Analytics |
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
Multiple local SCCM logs were accessed within a short period of time.
Attacker's Goals
Enumerate data about the SCCM configuration, infrastructure and deployments.
Investigative actions
- Check suspicious network connections from the process or host.
- Check if the user account that initiated the enumeration is supposed to access these files.