Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Labs icon Lab
  • Security
Google Cloud Platform icon
Labs

Identify Malicious Processes Using PowerShell

In this lab, you’ll practice and develop skills in PowerShell and Windows configuration to look at ways to create defensive capabilities within your corporate systems and on the company network looking for malicious processes. When you’re finished, you’ll have the necessary skills and knowledge to create tailored cyber security defense detections for activities relevant to blue team cyber security defense.

Google Cloud Platform icon
Labs

Path Info

Rating
(11 reviews)
Level
Clock icon Beginner
Duration
Clock icon 40m
Published
Clock icon Jan 31, 2024

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Table of Contents

  1. Challenge

    Getting Started in the Lab Environment

    Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!

  2. Challenge

    Analyze Process Validity

    In this challenge you will need to create PowerShell code on a corporate server to verify the processes in use are genuine and not malicious on the system. You will observe verified and also unverified processes when using your new Powershell code within a lab simulating malicious process identification.

    This will demonstrate how to use the built in Powershell capability available on common Windows operating systems to be able to perform customized security actions. This will help you and your organization protect critical machines in a repeatable way.

  3. Challenge

    Analyze Process Location and Files

    In this challenge you will develop PowerShell code on a corporate server to check the running processes, analyze where they are executed from and the files they are accessing. You will observe processes when using your new Powershell code and how to analyze malicious processes.

    This will demonstrate how to use the built in Powershell capability available on common Windows operating systems to be able to perform customized security analysis. This will help you and your organization protect critical machines.

  4. Challenge

    Process Detection and Alerting

    In this challenge you will use PowerShell looking at the running processes on a corporate server. You will compare the current processes with an approved allow list. Alerting and recording any new process not allowed, creating an alert warning system can be analyzed for suspicious activity.

    Perform these actions by remote access, using PowerShell.

    This will demonstrate how to use the built in Powershell capability available on common Windows operating systems to be able to perform customized security monitoring and detection for malicious processes. Helping you and your organization protect critical systems.

  5. Challenge

    The Last Challenge

    Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.

Tim Coakley is a Senior Security Solutions Architect for a large multi-national organisation and an author at PluralSight. Tim started a long and successful full-time career in Digital Forensics supporting the criminal justice system and law enforcement on a long list of criminal cases.

What's a lab?

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Provided environment for hands-on practice

We will provide the credentials and environment necessary for you to practice right within your browser.

Guided walkthrough

Follow along with the author’s guided walkthrough and build something new in your provided environment!

Did you know?

On average, you retain 75% more of your learning if you get time for practice.