Which firewall rule group must be enabled in order to allow for the remote use of the Task Scheduler snap in?

Remote Scheduled Task Creationedit

Identifies remote scheduled task creations on a target host. This could be indicative of adversary lateral movement.

Rule type: eql

Rule indices:

  • logs-endpoint.events.*
  • winlogbeat-*
  • logs-windows.*

Severity: medium

Risk score: 47

Runs every: 5 minutes

Searches indices from: now-9m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100

Tags:

  • Elastic
  • Host
  • Windows
  • Threat Detection
  • Lateral Movement
  • has_guide

Version: 101 (version history)

Added (Elastic Stack release): 7.11.0

Last modified (Elastic Stack release): 8.5.0

Rule authors: Elastic

Rule license: Elastic License v2

Investigation guideedit

## Triage and analysis

### Investigating Remote Scheduled Task Creation

[Scheduled tasks](https://docs.microsoft.com/en-us/windows/win32/taskschd/about-the-task-scheduler) are a great mechanism
for persistence and program execution. These features can be used remotely for a variety of legitimate reasons, but at
the same time used by malware and adversaries. When investigating scheduled tasks that were set up remotely, one of the
first steps should be to determine the original intent behind the configuration and to verify if the activity is tied to
benign behavior such as software installation or any kind of network administrator work. One objective for these alerts
is to understand the configured action within the scheduled task. This is captured within the registry event data for
this rule and can be base64 decoded to view the value.

#### Possible investigation steps

- Review the base64 encoded tasks actions registry value to investigate the task configured action.
- Validate the activity is not related to planned patches, updates, network administrator activity, or legitimate software
installations.
- Further examination should include review of host-based artifacts and network logs from around when the scheduled task
was created, on both the source and target machines.

### False positive analysis

- There is a high possibility of benign activity tied to the creation of remote scheduled tasks as it is a general feature
within Windows and used for legitimate purposes for a wide range of activity. Any kind of context should be found to
further understand the source of the activity and determine the intent based on the scheduled task's contents.

### Related rules

- Service Command Lateral Movement - d61cbcf8-1bc1-4cff-85ba-e7b21c5beedc
- Remotely Started Services via RPC - aa9a274d-6b53-424d-ac5e-cb8ca4251650

### Response and remediation

- Initiate the incident response process based on the outcome of the triage.
- Isolate the involved host to prevent further post-compromise behavior.
- Remove scheduled task and any other related artifacts.
- Review privileged account management and user account management settings. Consider implementing group policy object (GPO) policies to further
restrict activity, or configuring settings that only allow administrators to create remote scheduled tasks.

/* Task Scheduler service incoming connection followed by TaskCache
registry modification */ sequence by host.id, process.entity_id with
maxspan = 1m [network where process.name : "svchost.exe" and
network.direction : ("incoming", "ingress") and source.port >= 49152
and destination.port >= 49152 and source.ip != "127.0.0.1" and
source.ip != "::1" ] [registry where registry.path :
"HKLM\\SOFTWARE\\Microsoft\\Windows
NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\*\\Actions"]

Framework: MITRE ATT&CKTM

  • Tactic:

    • Name: Lateral Movement
    • ID: TA0008
    • Reference URL: https://attack.mitre.org/tactics/TA0008/

  • Technique:

    • Name: Remote Services
    • ID: T1021
    • Reference URL: https://attack.mitre.org/techniques/T1021/

  • Tactic:

    • Name: Execution
    • ID: TA0002
    • Reference URL: https://attack.mitre.org/tactics/TA0002/

  • Technique:

    • Name: Scheduled Task/Job
    • ID: T1053
    • Reference URL: https://attack.mitre.org/techniques/T1053/

Rule version historyedit

Version 101 (8.5.0 release)

  • Formatting only

Version 9 (8.4.0 release)

  • Formatting only

Version 8 (8.2.0 release)

  • Formatting only

Version 7 (8.1.0 release)

  • Formatting only

Version 6 (8.0.0 release)

  • Updated query, changed from:

    /* Task Scheduler service incoming connection followed by TaskCache
    registry modification */ sequence by host.id, process.entity_id with
    maxspan = 1m [network where process.name : "svchost.exe" and
    network.direction : ("incoming", "ingress") and source.port >= 49152
    and destination.port >= 49152 and source.address != "127.0.0.1" and
    source.address != "::1" ] [registry where registry.path :
    "HKLM\\SOFTWARE\\Microsoft\\Windows
    NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\*\\Actions"]

Version 5 (7.16.0 release)

  • Updated query, changed from:

    /* Task Scheduler service incoming connection followed by TaskCache
    registry modification */ sequence by host.id, process.entity_id with
    maxspan = 1m [network where process.name : "svchost.exe" and
    network.direction == "incoming" and source.port >= 49152 and
    destination.port >= 49152 and source.address != "127.0.0.1" and
    source.address != "::1" ] [registry where registry.path :
    "HKLM\\SOFTWARE\\Microsoft\\Windows
    NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\*\\Actions"]

Version 3 (7.13.0 release)

  • Formatting only

Version 2 (7.12.0 release)

  • Formatting only

What feature starting with PowerShell 4.0 allows for the use of declarative statements to manage and maintain servers?

Desired State Configuration (DSC) is a feature in PowerShell 4.0 and above that helps administrators to automate the configuration of Windows and Linux operating systems (OSes). DSC provides a set of PowerShell language extensions, cmdlets and a process called declarative scripting.

What PowerShell cmdlet can be used to add permissions to a share?

The Grant-SmbShareAccess cmdlet adds an allow access control entry (ACE) for a trustee to a security descriptor of the Server Message Block (SMB) share.

Which versions of Windows Server Cannot be managed using Server Manager if you are currently?

Server Manager running on Windows Server 2012 or Windows 8 cannot be used to manage servers that are running Windows Server 2012 R2 .

What is the term used by Microsoft to describe a collection of bug fixes?

​What is the term used by Microsoft to describe a collection of bug fixes and security updates made since an OS release? Server Pack.