



Rollout of log collection agents (the setup routine often includes a reset of the local Eventlog)įile_event_cve_2021_31979_cve_2021_33771_exploits.yml Admins may setup new or modify old spans, or use a monitor for troubleshooting SourceĪn attacker with the iam:UpdateLoginProfile permission on other users can change the password used to login to the AWS console on any user that already has a login profile setup.ĭescription : Show when a monitor or a span/rspan is setup or modified While setup.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes. The following table contains possible examples of setup.exe being misused.
