Use PowerShell to Determine the PDC Emulator FSMO Role Holder in your Active Directory Forest Root Domain · Mike F. Robbins
Tags
attack-pattern: | Domains - T1583.001 Domains - T1584.001 Powershell - T1059.001 Server - T1583.004 Server - T1584.004 Powershell - T1086 |
Common Information
Type | Value |
---|---|
UUID | e4ab74aa-4dbf-478c-9759-a0cfd75046da |
Fingerprint | eb8066f046d1a160 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | March 20, 2014, 12:30 p.m. |
Added to db | Jan. 18, 2023, 7:57 p.m. |
Last updated | Sept. 1, 2024, 2:02 a.m. |
Headline | Mike F. Robbins |
Title | Use PowerShell to Determine the PDC Emulator FSMO Role Holder in your Active Directory Forest Root Domain · Mike F. Robbins |
Detected Hints/Tags/Attributes | 7/1/0 |
Source URLs
URL Provider