Rules
Rules for PowerShell Protect.
$Condition = New-PSPCondition -Property "command" -contains -Value "webrequest"
$BlockAction = New-PSPAction -Block
$FileAction = New-PSPAction -File -Format "{applicationName},{rule}" -Path "%temp%\audit.csv" -Name 'File'
$Rule = New-PSPRule -Name "Web Request" -Condition $Condition -Action @($BlockAction, $FileAction)Conditions
Multiple Conditions
$Condition = New-PSPCondition -Property "command" -contains -Value "webrequest"
$Condition2 = New-PSPCondition -Property "command" -contains -Value "invoke"
$BlockAction = New-PSPAction -Block
$Rule = New-PSPRule -Name "Web Request" -Condition @($Condition, $Condition1) -Action @($BlockAction, $FileAction)Match One or More Conditions
$Condition = New-PSPCondition -Property "command" -contains -Value "webrequest"
$Condition2 = New-PSPCondition -Property "command" -contains -Value "invoke"
$BlockAction = New-PSPAction -Block
$Rule = New-PSPRule -AnyCondition -Name "Web Request" -Condition @($Condition, $Condition1) -Action @($BlockAction, $FileAction)Properties
Property Name
Description
Operators
Operator
Description
Value
Default Rules
AMSI Bypass Protection
Log4J CVE-2021-44228 (Log4Shell)
Module and Script Block Logging Bypass Protection
Assembly Load from Memory
Disabling Defender
Invoke-Expression
Use of the System.Reflection.Emit Namespace
PowerSploit
Marshal Class
Persistent WMI Event Subscription
BloudHound Injestor Execution
Kerberoasting
Disabling Default Rules
Last updated