Name:Get ADDefaultDomainPasswordPolicy with Powershell Script Block id:1ff7ccc8-065a-11ec-91e4-acde48001122 version:8 date:2026-02-25 author:Teoderick Contreras, Mauricio Velazco, Splunk status:production type:Hunting Description:The following analytic detects the execution of the `Get-ADDefaultDomainPasswordPolicy` PowerShell cmdlet, which is used to retrieve the password policy in a Windows domain. This detection leverages PowerShell Script Block Logging (EventCode=4104) to identify the specific command execution. Monitoring this activity is significant as it can indicate an attempt to gather domain policy information, which is often a precursor to further malicious actions. If confirmed malicious, this activity could allow an attacker to understand password policies, aiding in password attacks or further domain enumeration. Data_source:
| stats count min(_time) as firstTime max(_time) as lastTime BY dest signature signature_id user_id vendor_product EventID Guid Opcode Name Path ProcessID ScriptBlockId ScriptBlockText