Rules Contributing to Startup/Logon Script Added to Group Policy Object Alert
    
                                            The following rules detect suspicious SMB traffic related to GPO script modifications. Any one or more of these will trigger the Startup/Logon Script Added to Group Policy Object Alert. Details for each rule can be viewed by clicking the More Details link in the description.
| 
                                                             Title  | 
                                                        
                                                             Description  | 
                                                    ||||||||
|---|---|---|---|---|---|---|---|---|---|
| 
                                                             Startup/Logon Script added to Group Policy Object  | 
                                                        
                                                             Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects. More details 
                                                        Rule IDQuery{'selection_protocol': {'appid_name': 'smb'}, 'selection_share': {'metadata|contains': 'Policies'}, 'selection_relative_target_name': {'metadata|re': "'request'\\s*:\\s*\\{[^}]*(?:'filename'|'path')\\s*:\\s*'[^']*scripts\\.ini[^']*'[^}]*'command'\\s*:\\s*9[^}]*\\}"}, 'condition': 'all of selection*'} Log SourceStellar Cyber Network Events configured for: 
 Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
    N/A
 
                                                                    Severity50 Suppression Logic Based On
 Additional Information
  | 
                                                    
