- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
Windows – PowerShell Execution Policy Bypass
PowerShell Execution Policy Bypass SIEM Detection Test
The PowerShell execution policy is the setting that determines which type of PowerShell scripts (if any) can be run on the systems. By default, it is set to “Restricted.“ While this setting is not meant to be a security control, it is used often by attackers and malicious software to execute code on a system without having administrative-level access.How to Test PowerShell Execution Policy Bypass
Prerequisites:- Windows Server must be using NxLog integration and properly sending logs to Blumira
- GPO Advanced Logging (Logmira) must be configured and properly sending logs to Blumira
Testing Steps:
- Download our Blumira PowerShell Execution Policy Bypass testing script here; the file is non-threatening and is only used to demonstrate the detection
- Open Command Prompt
- Change to the directory that the above saved file is in.
- Run the command
PowerShell.exe PowershellTest.ps1
- Output should resemble the following:
- This detection test should trigger the finding "Potentially Malicious PowerShell Command - Event ID 4688" in your Blumira console
- Open Powershell
- Change to the directory that the above saved file is in.
- Run the command
.\PowershellTest.ps1
- Output should resemble the following:
- This detection test should trigger the finding "Potentially Malicious PowerShell Command - Event ID 4104" in your Blumira console
While testing your PowerShell execution policy detection is crucial, it's just one aspect of maintaining a strong security posture. Understanding your organization's complete external attack surface is equally important.
Want to discover potential security vulnerabilities across your domain before attackers do? Try the Blumira free Domain Security Assessment. It automatically scans your publicly accessible assets and provides actionable security insights in minutes. Learn more here.
Additional Security Resources
View All Posts
Security Trends and Info
9 min read
| July 24, 2025
Critical Microsoft SharePoint Server vulnerability allows unauthorized code execution
Read More
Customer Success Stories
6 min read
| July 15, 2025
Customer Story: LEAP Managed IT Streamlines Ticketing and Boosts Visibility with Blumira’s API
Read More
SIEM XDR
7 min read
| June 9, 2025
Customer Story: NetCenter Technologies
Read More