Skip to main content

Suspicious Local Administrator Login

This Playbook is part of the Cortex Response And Remediation Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.10.0 and later.

This playbook addresses the following alerts:

  • Suspicious local administrator login

Playbook Stages:

Investigation:

  • Retrieves the name of the process image involved in the alert.
  • Checks for related Powershell/Command and Scripting/WMI alerts in the incident.
  • Retrieves the host risk score.

Containment:

  • Provide a manual task for an analyst to review the findings and decide the next steps.
  • Possible actions:
  • Disable User.
  • Take no action.

Requirements:

  • For response actions, the following integration is required: Core - IR.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

This playbook does not use any sub-playbooks.

Integrations#

This playbook does not use any integrations.

Scripts#

  • IncreaseAlertSeverity
  • SearchAlertsV2
  • get-endpoint-data

Commands#

  • closeInvestigation
  • core-execute-command
  • core-get-cloud-original-alerts

Playbook Inputs#


There are no inputs for this playbook.

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


Suspicious Local Administrator Login