This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Monitoring blocked Powershell events

Hello Community,

Currently we are blocking all powershell interaction on all clients in our company via the Application Control feature in sophos central.

We are aware that a lot of applications are using powershell for updating their services and stuff like that.

Currently we are missing any option to monitor the activity which process are trying to execute powershell.

In the Logs & Reports section we just see that the user tried to execute the powershell.exe but not which process.

On the Logs of the client itselfe we just get an entry "Powershell got blocked by the administrator".

With Sophos Live Discover we just see successfully executed Powershell commands so that doesnt help us as well.

Does someone know how we can review the processes which tried to execute powershell but got blocked by sophos?

Thanks in forward!

Sincerely Yours.



This thread was automatically locked due to age.
Parents
  • Application control doesn't record that sort of action because the call to powershell is blocked at the PS launch based on it being powershell. AppC doesn't care what the parameters passed are.

    If you have XDR, that populates the datalake with the commands set so you could see them through that query system. 

    Is the idea that you want to allow some applications to call powershell? You aren't going to be able to have that granular control with AppC - it's an all or nothing sort of thing. The application is allowed to launch or not - there is no conditions.

    RichardP

    Program Manager, Support Readiness | CISSP | Sophos Technical Support
    Support Videos | Product Documentation | @SophosSupport | Sign up for SMS Alerts
    If a post solves your question use the 'Verify Answer' link.

  • Hello Richard,

    thanks for your answer.

    But do we see that information in the datalake?

    I thought that we only see data in the Live Discover section which got already executed and not blocked.

    We are aware that the AppC is a all or nothing setting and we are fine with that.

    We just want to see what applications are getting blocked and it could be a potential attack.

    Greetings.

Reply
  • Hello Richard,

    thanks for your answer.

    But do we see that information in the datalake?

    I thought that we only see data in the Live Discover section which got already executed and not blocked.

    We are aware that the AppC is a all or nothing setting and we are fine with that.

    We just want to see what applications are getting blocked and it could be a potential attack.

    Greetings.

Children