JAMF MDM Execution

Rule Info

Name
JAMF MDM Execution
Author
Jay Pandit
Description
Detects execution of the "jamf" binary to create user accounts and run commands. For example, the binary can be abused by attackers on the system in order to bypass security controls or remove application control polices.
Date
2023-08-22 00:00:00
Modified
None
Id
be2e3a5c-9cc7-4d02-842a-68e9cb26ec49
Tags
attack.execution
Type
Community Rule

Rule History

Author
Title
Date
Commit
Nasreddine Bencherchali
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
2024-08-12
github-actions[bot]
Merge PR #4891 from @nasbench - Promote older rules status from `experimental` to `test`
2024-07-01
phantinuss
fix: wording
2023-08-22
phantinuss
fix: wording
2023-08-22
Nasreddine Bencherchali
feat: update detection & metadata
2023-08-22