This rule is part of a beta feature. To learn more, contact Support.

Set up the sentinelone integration.

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when vssadmin is used to delete shadow copies.

Strategy

Threat actors are known to use tools found natively in a victim’s environment to accomplish their objectives. Vssadmin.exe, a native Windows utility, can be used to delete all shadow copies on a system.

Triage and response

  1. Identify the user or service account deleting shadow copies, and confirm if this is authorized or expected.
  2. If it’s not authorized, isolate the host from the network.
  3. Follow your organization’s internal processes for investigating and remediating compromised systems.
PREVIEWING: esther/docs-9478-fix-split-after-example