Hide Navigation Hide TOC Remote Service Activity via SVCCTL Named Pipe (586a8d6b-6bfe-4ad9-9d78-888cd2fe50c3) Detects remote service activity via remote access to the svcctl named pipe Cluster A Galaxy A Cluster B Galaxy B Level SMB/Windows Admin Shares - T1021.002 (4f9ca633-15c5-463c-9724-bdcd54fde541) Attack Pattern Remote Service Activity via SVCCTL Named Pipe (586a8d6b-6bfe-4ad9-9d78-888cd2fe50c3) Sigma-Rules 1 SMB/Windows Admin Shares - T1021.002 (4f9ca633-15c5-463c-9724-bdcd54fde541) Attack Pattern Remote Services - T1021 (54a649ff-439a-41a4-9856-8d144a2551ba) Attack Pattern 2