Lately I have been seeing more SONAR.Powershell!gx detections beeing blocked by SEP.
In the SONAR logs powershell.exe is listed as maclicious with a an action taken of "access denied". From my understanding this means that SONAR has blocked a malicious Powershell action.
https://support.symantec.com/en_US/article.TECH102052.html
It's very recent that we began to see these SONAR.Powershell detections. A few of them I actually manually identified by timestamp that matched scheduled tasks.These scripts were legit.
My main problem is that I don't know how to validate if the detections are true positives or not. I can't see the Powershell CLI arguments or script that SONAR has blocked as its not found in the SONAR logs. This is kind of strange as the arguments fields are usually found in other SEP alerts.
This also makes me wonder how I am supposed to whiteliste false positives? Have anyone came across this before?