MSExchange Transport Agent Installation
Detects the Installation of a Exchange Transport Agent
Sigma rule (View on GitHub)
1title: MSExchange Transport Agent Installation
2id: 83809e84-4475-4b69-bc3e-4aad8568612f
3related:
4 - id: 83809e84-4475-4b69-bc3e-4aad8568612f
5 type: similar
6status: test
7description: Detects the Installation of a Exchange Transport Agent
8references:
9 - https://speakerdeck.com/heirhabarov/hunting-for-persistence-via-microsoft-exchange-server-or-outlook?slide=7
10author: Tobias Michalski (Nextron Systems)
11date: 2021-06-08
12modified: 2022-10-09
13tags:
14 - attack.persistence
15 - attack.t1505.002
16logsource:
17 product: windows
18 category: process_creation
19detection:
20 selection:
21 CommandLine|contains: 'Install-TransportAgent'
22 condition: selection
23fields:
24 - AssemblyPath
25falsepositives:
26 - Legitimate installations of exchange TransportAgents. AssemblyPath is a good indicator for this.
27level: medium
References
Related rules
- Failed MSExchange Transport Agent Installation
- MSExchange Transport Agent Installation - Builtin
- A Member Was Added to a Security-Enabled Global Group
- A Member Was Removed From a Security-Enabled Global Group
- A New Trust Was Created To A Domain