title: Remote PowerShell Session id: 96b9f619-aa91-478f-bacb-c3e50f8df575 description: Detects remote PowerShell sessions status: experimental date: 2019/08/10 modified: 2019/11/10 author: Roberto Rodriguez @Cyb3rWard0g references: - https://github.com/Cyb3rWard0g/ThreatHunter-Playbook/tree/master/playbooks/windows/02_execution/T1086_powershell/powershell_remote_session.md tags: - attack.execution - attack.t1086 - attack.t1059.001 logsource: product: windows service: powershell detection: selection: EventID: - 4103 - 400 HostName: 'ServerRemoteHost' HostApplication|contains: 'wsmprovhost.exe' condition: selection falsepositives: - Legitimate use remote PowerShell sessions level: high