Boot or Logon Initialization Scripts: Network Logon Script

Adversaries may use network logon scripts automatically executed at logon initialization to establish persistence. Network logon scripts can be assigned using Active Directory or Group Policy Objects.[1] These logon scripts run with the privileges of the user they are assigned to. Depending on the systems within the network, initializing one of these scripts could apply to more than one or potentially all systems.

Adversaries may use these scripts to maintain persistence on a network. Depending on the access configuration of the logon scripts, either local credentials or an administrator account may be necessary.

ID: T1037.003
Sub-technique of:  T1037
Platforms: Windows
Version: 1.0
Created: 10 January 2020
Last Modified: 24 October 2025

Mitigations

ID Mitigation Description
M1022 Restrict File and Directory Permissions

Restrict write access to logon scripts to specific administrators.

Detection Strategy

ID Name Analytic ID Analytic Description
DET0367 Detect Network Logon Script Abuse via Multi-Event Correlation on Windows AN1034

Correlates Group Policy updates that configure network logon scripts with subsequent remote file execution behaviors triggered by user logons to identify potential persistence or execution chains tied to adversarial manipulation of logon scripts.

References