Which detection category would monitor PowerShell transcript logs and Windows Event logs to identify malicious hosts?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which detection category would monitor PowerShell transcript logs and Windows Event logs to identify malicious hosts?

Explanation:
PowerShell is a powerful tool that attackers frequently abuse to run commands, download payloads, and move laterally. By collecting PowerShell transcript logs and Windows Event logs, you get detailed visibility into exactly what commands were executed, with parameters and script content, and in what order. This makes it easier to spot suspicious patterns such as encoded or obfuscated commands, unusual invocation chains, or remote script execution. Since the focus is on monitoring PowerShell activity specifically, this detection approach provides precise telemetry to identify potentially compromised hosts, rather than just general command-line use or unrelated network activity. Other categories would monitor broader behaviors like reconnaissance or proxy traffic, which don’t directly capture PowerShell abuse.

PowerShell is a powerful tool that attackers frequently abuse to run commands, download payloads, and move laterally. By collecting PowerShell transcript logs and Windows Event logs, you get detailed visibility into exactly what commands were executed, with parameters and script content, and in what order. This makes it easier to spot suspicious patterns such as encoded or obfuscated commands, unusual invocation chains, or remote script execution. Since the focus is on monitoring PowerShell activity specifically, this detection approach provides precise telemetry to identify potentially compromised hosts, rather than just general command-line use or unrelated network activity. Other categories would monitor broader behaviors like reconnaissance or proxy traffic, which don’t directly capture PowerShell abuse.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy