• Skip to primary navigation
  • Skip to content
  • Skip to footer
Security Content Security Content
  • Detections
  • Analytic Stories
  • Playbooks
  • Blog
  • About
    • Type
      • Investigation
      • Response
    • Use Case
      • Endpoint
      • Enrichment
      • Phishing
    • D3fend Technique Category
      • Credential Eviction
      • File Analysis
      • File Eviction
      • Identifier Analysis
      • Message Analysis
      • Network Isolation
      • Restore Access
      • Restore Object
    • Soar App
      • AD LDAP
      • AWS IAM
      • Azure AD Graph
      • Carbon Black Response
      • Cisco Umbrella
      • CrowdStrike OAuth API
      • Cylance
      • Falcon Host API
      • G Suite for GMail
      • Jira
      • LDAP
      • MS Graph for Office 365
      • Palo Alto Networks Firewall
      • Panorama
      • Phantom
      • PhishTank
      • Reversing Labs
      • SMTP
      • SSH
      • ServiceNow
      • Splunk
      • Splunk Attack Analyzer Connector for Splunk SOAR
      • Threat Grid
      • TruSTAR
      • VirusTotal
      • VirusTotal v3
      • WildFire
      • Windows Defender ATP
      • Windows Remote Management
      • Zscaler
      • urlscan.io

    Windows Remote Management

    Name SOAR App D3FEND Use Case
    Delete Detected Files Windows Remote Management    
    Internal Host WinRM Investigate Windows Remote Management    
    Internal Host WinRM Log4j Investigate Windows Remote Management    
    Internal Host WinRM Response Windows Remote Management    
    • Twitter
    • GitHub
    • Feed
    © 2024 Splunk Threat Research Team (STRT). Powered by Jekyll & Minimal Mistakes.