Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Suggested addition to ProcessAccess event, for MS Intune #208

Open
cyb3rxp opened this issue Oct 7, 2024 · 0 comments
Open

Suggested addition to ProcessAccess event, for MS Intune #208

cyb3rxp opened this issue Oct 7, 2024 · 0 comments

Comments

@cyb3rxp
Copy link

cyb3rxp commented Oct 7, 2024

Hi,

I'd like to report the following field feedback: numerous events 10 being generated by Microsoft Intune process, targeting regular/legit running processes.

Here is the common SourceImage (should be needed for exclusion, IMHO) of those events:
C:\Program Files (x86)\Microsoft Intune Management Extension\Microsoft.Management.Services.IntuneWindowsAgent.exe

Below are examples of legit processes being listed in the "TargetImage" for those events:

  • C:\WINDOWS\system32\wbem\WmiApSrv.exe
  • C:\WINDOWS\system32\deviceenroller.exe
  • \?\C:\WINDOWS\system32\wbem\WMIADAP.EXE
  • C:\Program Files\WSL\wsl.exe
  • C:\Program Files\Notepad++\notepad++.exe
  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
  • C:\Program Files\WindowsApps\Microsoft.SurfaceHub_74.8150.129.0_x64__8wekyb3d8bbwe\Services\DeviceColorDm.exe

HTH.
Thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant