What is a recommended strategy for defending against PowerShell attacks?
- Enable all service accounts to mitigate credential theft.
- Configure logging to exclude account creation or deletion events.
- Block PowerShell with AppLocker or Group Policy Object (GPO) settings.
- Configure user groups on domain controllers with full administrative rights.
Explanation & Hint:
A recommended strategy for defending against PowerShell attacks is to “Block PowerShell with AppLocker or Group Policy Object (GPO) settings.” PowerShell is a powerful tool that can be used by attackers to execute scripts and commands that compromise security. Using AppLocker or GPO settings to restrict PowerShell usage can help prevent unauthorized or malicious PowerShell activities. This can include limiting PowerShell execution to only signed scripts, or completely blocking PowerShell for users who do not require it for their day-to-day tasks. The other options mentioned are not recommended practices and could actually weaken security:
|