Portal
houstons.tech Domain Audit
MITRE ATT&CK Endpoint Assessment
autographman.co.uk Domain Audit
CONFIDENTIAL — ENDPOINT-01 — MITRE ATT&CK Endpoint Assessment — ADD-MITRE-2026-002
MITRE ATT&CK Assessment

Endpoint Security Assessment

ENDPOINT-01 presents a mixed security posture with strong credential protections undermined by critical authentication gaps and weak defensive monitoring. The primary account '[USER]' has no password requirement — the most severe finding — while paradoxically, LSA Protection (RunAsPPL) is enabled and WDigest plaintext storage is disabled, indicating intentional hardening in some areas. Windows Defender is operational with current signatures (0-day old) but Tamper Protection is disabled and Windows Update service is stopped, both high-impact gaps. The attack surface is expanded by 31 listening TCP services including RDP (3389) and PostgreSQL (5432) bound to all interfaces, 19 autostart persistence points, and 10 Defender exclusion paths covering development tools. PowerShell Script Block Logging is not configured, creating a critical forensic blind spot. One suspicious outbound connection was detected: [Remote-Access-Tool] connecting to an external IP on a non-standard port.

Hostname
ENDPOINT-01
Document ID
ADD-MITRE-2026-002
Date
5 March 2026
OS
Microsoft Windows 11 Pro
Mode
Full Scan
Techniques
10 checked
01 — Executive Summary

Security Posture Overview

MITRE ATT&CK endpoint assessment for ENDPOINT-01

17
Total Findings
1
Critical
4
High
10
Techniques
Critical
1
1
High
4
4
Medium
6
6
Low
3
3
Info
3
3
⚡ Quick Wins

Set a password on the Tom account — eliminates the #1 critical finding
Enable Tamper Protection via Windows Security UI (cannot be done via GPO/registry)
Enable PowerShell Script Block Logging — single registry key
Restrict RDP to specific IPs via Windows Firewall
Remove C:\Users\[USER]\AppData\Local\Temp from Defender exclusions

02 — Scope & Methodology

Assessment Scope

This assessment maps local system state to the MITRE ATT&CK Framework. 10 techniques were evaluated using deterministic PowerShell checks with zero-token data collection.

TechniqueNameTactic
T1547Boot/Logon AutostartPersistence
T1078Valid AccountsCredential Access
T1046Network Service DiscoveryDiscovery
T1562Impair DefensesDefense Evasion
T1053Scheduled Task/JobExecution
T1059Command and ScriptingExecution
T1036MasqueradingDefense Evasion
T1003OS Credential DumpingCredential Access
T1071Application Layer ProtocolCommand and Control
T1027Obfuscated FilesDefense Evasion
03 — ATT&CK Coverage

Tactic Coverage Radar

Security posture across MITRE ATT&CK tactic dimensions

MITRE ATT&CK Tactic Scores
Persistence (C)Def. Evasion (D)Execution (D)Cred. Access (C)Discovery (C)
T1547
1
Boot/Logon Autostart
T1078
2
Valid Accounts
T1046
1
Network Service Discovery
T1562
5
Impair Defenses
T1053
1
Scheduled Task/Job
T1059
1
Command and Scripting
T1036
2
Masquerading
T1003
2
OS Credential Dumping
T1071
1
Application Layer Protocol
T1027
1
Obfuscated Files
04 — Detailed Findings

Security Findings

17 findings across 10 MITRE ATT&CK techniques

ADD-001 Critical T1078

No Password Required on Primary Account

The primary user account '[USER]' (administrator, last logon 2026-03-03) does not require a password for login. Combined with RDP listening on all interfaces, this allows unrestricted local and potentially remote access without any authentication challenge.

Likelihood
Impact
Evidence & Remediation
Evidence
Get-LocalUser '[USER]': PasswordRequired=False, PasswordExpires=Never, Enabled=True. Account is member of Administrators group. RDP (3389) bound to 0.0.0.0 and ::.
Remediation
Set a strong password immediately:
net user [USER] <NewStrongPassword>

Also enforce minimum complexity:
net accounts /minpwlen:14 /maxpwage:90

Critical: With RDP exposed, this is remotely exploitable.
ADD-002 High T1562.001

Windows Defender Tamper Protection Disabled

Tamper Protection is disabled, allowing any process (including malware) to modify or disable Windows Defender settings, exclusions, and real-time protection without administrator consent. This is the most critical defense gap — it means all other Defender protections can be silently turned off.

Likelihood
Impact
Evidence & Remediation
Evidence
Get-MpComputerStatus: TamperProtection=False. All other Defender features are enabled (RealTimeProtection=True, BehaviorMonitor=True, IoavProtection=True, NISEnabled=True), but can be disabled by any admin process without Tamper Protection.
Remediation
Enable Tamper Protection:
1. Open Windows Security → Virus & threat protection → Settings
2. Turn on Tamper Protection

Note: This must be done via the UI or Intune — registry/GPO cannot enable it (by design).
ADD-003 High T1562.001

Extensive Defender Exclusions — 10 Paths + 12 Processes

Windows Defender has 10 path exclusions and 12 process exclusions configured, primarily for development tools (Node.js, npm, Git, fnm, SSH). While these improve development performance, they create significant blind spots where malware could operate undetected — particularly in C:\GIT, C:\Users\[USER]\AppData\Local\Temp, and all npm/node directories.

Likelihood
Impact
Evidence & Remediation
Evidence
Excluded paths: C:\GIT, C:\Users\[USER]\.ccs, C:\Users\[USER]\.claude, C:\Users\[USER]\.npm-global, fnm_multishells, Temp, claude temp, fnm, npm-cache, node_modules. Excluded processes: [Sync-Tool]\Bin\*, npm-global\node_modules\*, fnm node.exe (2 paths), Everything.exe, git-remote-https.exe, git.exe, node.exe, npm.cmd, npx.cmd, ssh.exe.
Remediation
Review and reduce exclusions:
1. Remove C:\Users\[USER]\AppData\Local\Temp — high-risk malware staging area
2. Replace broad path exclusions with specific process exclusions where possible
3. Consider using Controlled Folder Access to compensate
4. Audit C:\GIT exclusion — consider per-repo exclusions instead of blanket
ADD-004 High T1059.001

PowerShell Script Block Logging Disabled

Neither PowerShell Script Block Logging nor Module Logging is enabled. PowerShell Transcription is also disabled. This means no PowerShell execution is recorded in event logs, creating a complete forensic blind spot for the most commonly abused Windows attack tool.

Likelihood
Impact
Evidence & Remediation
Evidence
ScriptBlockLogging: enabled=false. ModuleLogging: enabled=false. Transcription: enabled=false. LanguageMode: FullLanguage (no Constrained Language Mode).
Remediation
Enable all three PowerShell logging mechanisms:

1. Script Block Logging (most important):
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging" /v EnableScriptBlockLogging /t REG_DWORD /d 1 /f

2. Module Logging:
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ModuleLogging" /v EnableModuleLogging /t REG_DWORD /d 1 /f

3. Transcription (saves to disk):
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription" /v EnableTranscripting /t REG_DWORD /d 1 /f
ADD-005 High T1046

RDP and PostgreSQL Exposed on All Interfaces

Remote Desktop Protocol (3389) and PostgreSQL (5432) are listening on 0.0.0.0 and :: (all network interfaces). Combined with the passwordless Tom account (ADD-001), RDP exposure is critically dangerous. 31 total TCP listeners were detected across the system.

Likelihood
Impact
Evidence & Remediation
Evidence
High-risk services on all interfaces:
- RDP (3389): svchost, bound to 0.0.0.0 + ::
- PostgreSQL (5432): postgres, bound to 0.0.0.0 + ::

Additional notable listeners: [Remote-Access-Tool] relay (21115-21119), Hyper-V (2179), VMware (902, 912), [VPN-Client], Obsidian (6699), Print Spooler.

Firewall profiles: Domain/Private/Public all enabled but inbound/outbound defaults = NotConfigured.
Remediation
1. Restrict RDP via Windows Firewall to specific IPs:
netsh advfirewall firewall add rule name="RDP Restrict" dir=in action=allow protocol=TCP localport=3389 remoteip=<TRUSTED_IP>
netsh advfirewall firewall add rule name="RDP Block" dir=in action=block protocol=TCP localport=3389

2. Bind PostgreSQL to localhost: Edit postgresql.conf → listen_addresses = 'localhost'

3. Review if [Remote-Access-Tool] relay (21115-21119) and VMware (902, 912) need external exposure
ADD-006 Medium T1078

Minimum Password Length Set to Zero

The local password policy allows zero-length passwords, enabling accounts to be created or maintained without any password. The lockout policy (threshold: 10 attempts, duration: 10 minutes) provides some protection, but empty passwords bypass lockout entirely.

Likelihood
Impact
Evidence & Remediation
Evidence
net accounts: MinimumPasswordLength=0, MaximumPasswordAge=42 days, LockoutThreshold=10, LockoutDuration=10 minutes.
Remediation
Enforce minimum password length:
net accounts /minpwlen:14

Also consider complexity requirements via Local Security Policy:
secpol.msc → Account Policies → Password Policy → Password must meet complexity requirements: Enabled
ADD-007 Medium T1562.001

Windows Update Service Stopped

The Windows Update service (wuauserv) is stopped with Manual start type. While Windows Update may start on demand, a stopped update service means security patches may not be automatically applied, leaving known vulnerabilities unpatched.

Likelihood
Impact
Evidence & Remediation
Evidence
Windows Update service: Status=Stopped, StartType=Manual.
Remediation
Verify Windows Update is functioning:
Get-Service wuauserv | Start-Service
Set-Service wuauserv -StartupType Automatic

Check for pending updates:
Install-Module PSWindowsUpdate -Force; Get-WindowsUpdate
ADD-008 Medium T1003

Credential Guard Not Active Despite VBS Running

Virtualization Based Security (VBS) is running (status=2) but Credential Guard is not active — security services configured and running both report [0] (none). This means the hardware capability exists but credential isolation is not leveraged, leaving NTLM hashes and Kerberos tickets accessible in LSASS memory.

Likelihood
Impact
Evidence & Remediation
Evidence
Win32_DeviceGuard: VirtualizationBasedSecurityStatus=2 (Running). SecurityServicesRunning=[0] (None). SecurityServicesConfigured=[0] (None). Note: LSA Protection (RunAsPPL) IS enabled (mitigating factor).
Remediation
Enable Credential Guard via Group Policy:
Computer Configuration → Admin Templates → System → Device Guard → Turn On Virtualization Based Security
Set 'Credential Guard Configuration' to 'Enabled with UEFI lock'

Or via registry:
reg add "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v LsaCfgFlags /t REG_DWORD /d 1 /f

Requires reboot.
ADD-009 Medium T1071

Suspicious Outbound Connection — [Remote-Access-Tool] to External IP

[Remote-Access-Tool] (remote desktop software) was detected with an active outbound connection to [EXT-RELAY-IP]:21117. While [Remote-Access-Tool] is a legitimate remote access tool, its relay protocol on non-standard ports can be abused for command-and-control communications. The [Remote-Access-Tool] relay server (hbbs/hbbr) is also running locally on ports 21115-21119.

Likelihood
Impact
Evidence & Remediation
Evidence
Suspicious outbound: [Remote-Access-Tool] (PID 7944) → [EXT-RELAY-IP]:21117. Local [Remote-Access-Tool] relay: hbbs on 21115/21116/21118, hbbr on 21117/21119. All bound to :: (all interfaces).
Remediation
If [Remote-Access-Tool] is intentional:
1. Verify [EXT-RELAY-IP] is a known [Remote-Access-Tool] relay server
2. Restrict relay server to listen on localhost or VPN interface only
3. Document as accepted risk

If not intentional:
1. Stop services: Stop-Service [Remote-Access-Tool]*
2. Remove: winget uninstall [Remote-Access-Tool]
3. Block ports 21115-21119 in Windows Firewall
ADD-010 Medium T1547

19 Non-Standard Autostart Entries

19 autostart entries were found across registry Run keys (11) and startup folders (7), plus 1 WMI event subscription. While most appear to be legitimate applications ([Chat-App], [Media-App], Teams, Backblaze, Claude, [VoIP-Client], [VPN-Client], [Remote-Access-Tool], [Screenshot-Tool]), the volume significantly expands the persistence attack surface and increases boot time.

Likelihood
Impact
Evidence & Remediation
Evidence
HKCU Run keys (10): [Chat-App], Backblaze, [Media-App], Claude, [Email-Client], [VoIP-Client], Teams, [Task-App], [VPN-Mesh-Client], (default).
HKLM Run keys (1): [Chat-App] (SquirrelMachineInstalls).
Startup folder (7): [Time-Tracker], DDM2.0, Send to OneNote, [Screenshot-Tool], Dell Display Manager, [Remote-Access-Tool] Tray, [VPN-Client].
WMI subscription: SCM Event Log Filter.
Remediation
Review and remove unnecessary autostart entries:
1. (default) entry in HKCU Run — likely garbage, remove
2. [Chat-App] appears twice (HKCU + HKLM) — remove one
3. Evaluate if [Time-Tracker], DDM2.0, Send to OneNote need autostart
4. WMI SCM Event Log Filter — verify this is legitimate

Use: msconfig → Startup tab, or Task Manager → Startup
ADD-011 Medium T1036

Unquoted Service Path — ASUS System Control Service

The ASUS System Control Service has an unquoted binary path containing spaces: 'C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.22\AsSysCtrlService.exe'. While the service is currently Disabled/Stopped, if enabled, an attacker could place a malicious 'C:\Program.exe' or 'C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.22\AsSysCtrlService.exe' to hijack execution.

Likelihood
Impact
Evidence & Remediation
Evidence
AsSysCtrlService: Path='C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.22\AsSysCtrlService.exe' (unquoted, contains spaces). State=Stopped, StartMode=Disabled.
Remediation
Quote the service path:
sc config AsSysCtrlService binPath= "\"C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.22\AsSysCtrlService.exe\""

Or if unused, remove the service entirely:
sc delete AsSysCtrlService
ADD-012 Low T1036

Cloudflared Running from User Directory

The Cloudflare Tunnel agent (cloudflared.exe) is running as a service from C:\Users\[USER]\cloudflared.exe instead of the standard Program Files location. While this is a legitimate Cloudflare binary, services running from user-writable directories are higher risk — any user-level compromise could replace the binary.

Likelihood
Impact
Evidence & Remediation
Evidence
Service: Cloudflared, Path=C:\Users\[USER]\cloudflared.exe, State=Running.
Remediation
Move cloudflared to a protected location:
1. Stop the service
2. Move to C:\Program Files\cloudflared\cloudflared.exe
3. Update service path: sc config cloudflared binPath= "C:\Program Files\cloudflared\cloudflared.exe"
4. Restart service
ADD-013 Low T1053

3 SYSTEM-Privilege Scheduled Tasks

Three scheduled tasks run with SYSTEM-level privileges: Google Updater, SpaceManager (Windows Storage), and WaaSMedic (Windows Update remediation). While all appear legitimate, SYSTEM-running custom tasks are high-value persistence mechanisms.

Likelihood
Impact
Evidence & Remediation
Evidence
SYSTEM tasks:
1. GoogleUpdaterTaskSystem147.0.7703.0 — updater.exe --wake --system
2. SpaceManagerTask — spaceman.exe /Work (Windows built-in)
3. PerformRemediation — WaaSMedic (Windows Update self-heal)

9 total custom tasks. 6 non-Microsoft user-level tasks (Monthly Doc Audit, Vivaldi Update, Zoom Update, Google Updater x2, Backblaze).
Remediation
Review SYSTEM tasks:
1. Google Updater — Consider if SYSTEM privileges are necessary; could run as user
2. SpaceManagerTask and WaaSMedic — Legitimate Windows tasks, no action needed

Monitor for new SYSTEM tasks: Get-ScheduledTask | Where-Object {$_.Principal.UserId -eq 'SYSTEM' -and $_.Author -notmatch 'Microsoft'}
ADD-014 Low T1562.004

Firewall Default Actions Not Configured

All three Windows Firewall profiles (Domain, Private, Public) are enabled but have DefaultInboundAction and DefaultOutboundAction set to 'NotConfigured'. This defers to the built-in Windows defaults (block inbound, allow outbound), but explicit configuration is a best practice for defense-in-depth.

Likelihood
Impact
Evidence & Remediation
Evidence
Firewall profiles:
- Domain: Enabled=1, InboundDefault=NotConfigured, OutboundDefault=NotConfigured
- Private: Enabled=1, InboundDefault=NotConfigured, OutboundDefault=NotConfigured
- Public: Enabled=1, InboundDefault=NotConfigured, OutboundDefault=NotConfigured
Remediation
Explicitly set firewall defaults:
Set-NetFirewallProfile -Profile Domain,Private,Public -DefaultInboundAction Block -DefaultOutboundAction Allow

For enhanced security, consider restricting outbound:
Set-NetFirewallProfile -Profile Public -DefaultOutboundAction Block
Then add specific outbound allow rules.
ADD-015 Info T1003

LSA Protection (RunAsPPL) Enabled — Strong Credential Defense

LSA Protection is enabled, running LSASS as a Protected Process Light (PPL). This prevents unauthorized processes — including tools like Mimikatz — from reading or injecting into LSASS memory. Combined with disabled WDigest plaintext storage, this is a strong credential defense.

Evidence & Remediation
Evidence
LSA Protection: RunAsPPL=True. WDigest: UseLogonCredential=0, PlaintextPasswords=False.
Remediation
No action required. This is properly configured and represents best-practice credential protection.
ADD-016 Info T1562

Windows Defender Fully Operational with Current Signatures

Windows Defender is fully operational: real-time protection, behavior monitoring, IOAV protection, NIS, and antispyware are all enabled. Signature database is current (0 days old). Engine version 1.1.26010.1 is current. The only gaps are Tamper Protection (ADD-002) and cloud protection status (Unknown).

Evidence & Remediation
Evidence
Defender status: AntivirusEnabled=True, RealTimeProtection=True, BehaviorMonitor=True, IoavProtection=True, NISEnabled=True, AntispywareEnabled=True. SignatureAge=0 days. ProductStatus=4.18.26010.5. CloudProtection=Unknown.
Remediation
Verify cloud protection: Get-MpComputerStatus | Select CloudEnabled, CloudExtendedTimeout
If disabled: Set-MpPreference -MAPSReporting Advanced
ADD-017 Info T1027

No Alternate Data Streams or Hidden Executables Detected

The obfuscation scan found no Alternate Data Streams (ADS) and no hidden executables in system directories. This is a clean result indicating no file-system-level obfuscation techniques are in use.

Evidence & Remediation
Evidence
ADS count: 0. Hidden executables: 0.
Remediation
No action required. Clean result.
05 — Risk Matrix

Risk Assessment

Findings mapped by likelihood and impact (columns: likelihood, rows: impact)

Risk Assessment Matrix
Very Low
Low
Moderate
High
Very High
Very High
High
Moderate
Low
Very Low
06 — Persistence (T1547)

Boot/Logon Autostart Execution

19 autostart entries detected outside standard system paths

Registry Run Keys

NameCommandLocation
[Chat-App]"C:\Users\[USER]\AppData\Local\[Chat-App]\Update.exe" --processStart [Chat-App].exeHKCU
BackblazeC:\PROGRA~2\BACKBL~1\bzbui.exe -quietHKCU
[Media-App]C:\Users\[USER]\AppData\Roaming\[Media-App]\[Media-App].exe --autostart --minimizedHKCU
Claude"C:\Users\[USER]\AppData\Local\[AI-Assistant]\[ai-assistant].exe" --startupHKCU
(default)HKCU
[Email-Client]C:\Users\[USER]\AppData\Local\Programs\[Email-Client]\[Email-Client].exeHKCU
[VoIP-Client]"C:\Users\[USER]\AppData\Local\[VoIP-Client]\[VoIP-Client].exe" /minimizedHKCU
Teams"C:\Users\[USER]\AppData\Local\Microsoft\WindowsApps\MSTeams_8wekyb3d8bbwe\ms-teams.exe" msteams:system-initiatedHKCU
com.[Task-App]C:\Users\[USER]\AppData\Local\Programs\[Task-App]\[Task-App].exeHKCU
[VPN-Mesh-Client]"C:\Users\[USER]\.local\bin\[vpn-mesh-client].exe"HKCU
[Chat-App]C:\ProgramData\SquirrelMachineInstalls\[Chat-App].exe --checkInstallHKLM

Startup Folder Items

NameTypeLocation
[Time-Tracker].lnk.lnkC:\Users\[USER]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
DDM2.0.lnk.lnkC:\Users\[USER]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Send to OneNote.lnk.lnkC:\Users\[USER]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
[Screenshot-Tool].lnk.lnkC:\Users\[USER]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Dell Display Manager.lnk.lnkC:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
[Remote-Access-Tool] Tray.lnk.lnkC:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
[VPN-Client].lnk.lnkC:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
07 — Valid Accounts (T1078)

Local User Accounts

2 enabled accounts, 3 administrators

UsernameEnabledLast LogonPassword Expires
AdministratorNoNeverNever
DefaultAccountNoNeverNever
GuestNoNeverNever
[USER2]Yes2026-02-24T06:09:132026-04-06T05:06:25
[USER]Yes2026-03-03T18:37:59Never
WDAGUtilityAccountNoNever2025-02-25T08:16:40

Account Anomalies

UserIssueSeverity
[USER]Password never expiresmedium
[USER]No password requiredhigh

Administrators Group

NameTypeSource
ENDPOINT-01\AdministratorUserLocal
ENDPOINT-01\[USER2]UserLocal
ENDPOINT-01\[USER]UserLocal

Password Policy

max age

42

min length

0

lockout threshold

10

lockout duration

10

08 — Network Services (T1046)

Network Service Discovery

31 non-loopback listeners, 4 high-risk services exposed

⚠ High-Risk Exposed Services

PostgreSQL (port 5432) — postgres
RDP (port 3389) — svchost
PostgreSQL (port 5432) — postgres
RDP (port 3389) — svchost

Listening Ports (non-system)

PortAddressProcessPID
60811::Antigravity12800
49681::services1232
49670::spoolsv5764
49669::svchost4556
49668::svchost3668
49667::svchost3516
49665::wininit1152
[TS-PORT][[VPN-Client]-V6][VPN-Client]d9348
21119::hbbr9060
21118::hbbs9024
21117::hbbr9060
21116::hbbs9024
21115::hbbs9024
5432::postgres8616
5357::System4
3389::svchost2000
2179::vmms3336
[TS-PORT2][[VPN-Client]-V4][VPN-Client]d9348
496810.0.0.0services1232
496700.0.0.0spoolsv5764
496690.0.0.0svchost4556
496680.0.0.0svchost3668
496670.0.0.0svchost3516
496650.0.0.0wininit1152
9696127.0.0.2System4
66990.0.0.0Obsidian16268
54320.0.0.0postgres8616
33890.0.0.0svchost2000
21790.0.0.0vmms3336
9120.0.0.0vmware-authd6744

... and 1 more

Firewall Profiles

ProfileEnabledInboundOutbound
Domain&#10003; YesNotConfiguredNotConfigured
Private&#10003; YesNotConfiguredNotConfigured
Public&#10003; YesNotConfiguredNotConfigured
09 — Defense Status (T1562)

Impair Defenses Assessment

2 defense anomalies detected

Tamper protection disabled

Severity: high

Windows Update service: Stopped

Severity: medium

Windows Defender Status

Real-Time Protection

✓ Enabled

Antivirus

✓ Enabled

Tamper Protection

✗ Disabled

Behavior Monitor

✓ Enabled

Cloud Protection

Unknown

Signature Age

0 days

Defender Exclusions

⚠ Active Exclusions Found

Paths: C:\GIT, C:\Users\[USER]\.ccs, C:\Users\[USER]\.claude, C:\Users\[USER]\.npm-global, C:\Users\[USER]\AppData\Local\fnm_multishells, C:\Users\[USER]\AppData\Local\Temp, C:\Users\[USER]\AppData\Local\Temp\claude, C:\Users\[USER]\AppData\Roaming\fnm, C:\Users\[USER]\AppData\Roaming\npm-cache, C:\Users\[USER]\node_modules
Processes: C:\Program Files\[Sync-Tool]\Bin\*, C:\Users\[USER]\.npm-global\node_modules\*, C:\Users\[USER]\AppData\Local\fnm_multishells\*\node.exe, C:\Users\[USER]\AppData\Roaming\fnm\node-versions\*\installation\node.exe, Everything.exe, git-remote-https.exe, git.exe, node.exe, npm.cmd, npx.cmd, ssh.exe
Extensions: None

UAC Configuration

consent prompt user

3

enable lua

✓ Enabled

prompt on secure desktop

✓ Enabled

consent prompt admin

2

10 — Scheduled Tasks (T1053)

Scheduled Task Analysis

9 non-Microsoft tasks, 3 suspicious

⚠ Suspicious Scheduled Tasks
TaskAuthorRun AsReasons
GoogleUpdaterTaskSystem147.0.7703.0{2794FE61-0FE6-4C22-B52B-36E445402496}NT AUTHORITY\SYSTEMSYSTEMRuns as SYSTEM
SpaceManagerTask$(@%SystemRoot%\system32\spaceman.exe,-2)SYSTEMRuns as SYSTEM
PerformRemediation$(@%systemroot%\system32\WaasMedicSvcImpl.dll,-102)SYSTEMRuns as SYSTEM

Non-Microsoft Tasks

TaskAuthorStateRun As
Monthly Documentation Audit (REP-012)ENDPOINT-01\[USER]Ready[USER]
VivaldiUpdateCheck-03b93b12826abc18Vivaldi Technologies ASReady[USER]
ZoomUpdateTaskUser-S-1-5-21-[REDACTED]-1001Zoom Communications, Inc.Ready[USER]
GoogleUpdaterTaskSystem147.0.7703.0{2794FE61-0FE6-4C22-B52B-36E445402496}NT AUTHORITY\SYSTEMReadySYSTEM
Backup$(@%SystemRoot%\system32\AppListBackupLauncher.dll,-600)Ready
BackupNonMaintenance$(@%SystemRoot%\system32\AppListBackupLauncher.dll,-600)Ready
UnifiedConsentSyncTask$(@%systemRoot%\system32\unifiedconsent.dll,-102)Ready
SpaceManagerTask$(@%SystemRoot%\system32\spaceman.exe,-2)ReadySYSTEM
PerformRemediation$(@%systemroot%\system32\WaasMedicSvcImpl.dll,-102)ReadySYSTEM
11 — Technique Summary

Assessment Results by Technique

TechniqueNameTacticStatusFindings
T1547Boot/Logon AutostartPersistenceMedium1
T1078Valid AccountsCredential AccessCritical2
T1046Network Service DiscoveryDiscoveryHigh1
T1562Impair DefensesDefense EvasionHigh5
T1053Scheduled Task/JobExecutionLow1
T1059Command and ScriptingExecutionHigh1
T1036MasqueradingDefense EvasionMedium2
T1003OS Credential DumpingCredential AccessMedium2
T1071Application Layer ProtocolCommand and ControlMedium1
T1027Obfuscated FilesDefense EvasionInfo1
12 — Roadmap

Remediation Roadmap

Prioritized actions to improve endpoint security posture

Now

Immediate Actions

Set strong password on Tom account (1 minute)
Eliminates unrestricted local+remote access (ADD-001)

Enable minimum password length (14 chars) (1 minute)
Prevents weak/empty passwords (ADD-006)

Enable Tamper Protection (2 minutes)
Prevents malware from disabling Defender (ADD-002)

1-2 wk

Short Term

Enable PowerShell Script Block + Module Logging (5 minutes)
Creates forensic audit trail for all PowerShell execution (ADD-004)

Restrict RDP/PostgreSQL firewall rules (15 minutes)
Reduces network attack surface from 31 to essential listeners (ADD-005)

Audit and reduce Defender exclusions (20 minutes)
Closes 10 malware blind spots (ADD-003)

Move cloudflared.exe to Program Files (10 minutes)
Prevents user-level binary replacement (ADD-012)

1-3 mo

Medium Term

Enable Credential Guard (30 minutes + reboot)
Hardware-backed credential isolation via VBS (ADD-008)

Review and reduce autostart entries (20 minutes)
Reduces 19 persistence points to essential minimum (ADD-010)

Evaluate [Remote-Access-Tool] necessity and restrict relay (15 minutes)
Eliminates suspicious outbound + 5 listening ports (ADD-009)

Explicitly configure firewall defaults (5 minutes)
Defense-in-depth for all profiles (ADD-014)

13 — Appendices

Reference Information

MITRE ATT&CK Reference

Enterprise Matrix

Full ATT&CK matrix for enterprise environments

Mitigations

Security controls mapped to ATT&CK techniques

Data Sources

Detection data sources for each technique

Scan Metadata

PropertyValue
HostnameENDPOINT-01
OSMicrosoft Windows 11 Pro
OS VersionMicrosoft Windows NT 10.0.26100.0
Scan Timestamp2026-03-05T12:33:58Z
Modefull
ElevatedYes
Script Version1.0
Report IDADD-MITRE-2026-002
CONFIDENTIAL — ENDPOINT-01 — ADD-MITRE-2026-002