Workflow Detail

PowerShell Analysis

Monitors and analyzes PowerShell execution patterns to detect malicious activity, privilege escalation attempts, and suspicious command execution that may indicate compromise.

How It Works

Fluency's AI analyzes PowerShell execution events to identify suspicious patterns, obfuscated commands, and potential privilege escalation attempts. The system examines command syntax, execution context, and historical patterns to distinguish between legitimate administrative tasks and malicious activity.

  • Detects obfuscated and encoded PowerShell commands
  • Monitors for privilege escalation patterns
  • Analyzes execution context and user permissions
  • Identifies suspicious command chaining and automation
  • Provides context on command intent and potential impact

Feature Comparison

AI Analysis vs Splunk SPL-Based Detection

See how advanced AI-driven security analysis compares to traditional SPL-based detection in key areas of context, logic, and output quality.

Feature / CapabilityAI AnalysisSplunk SPL-Based Detection
IP to location logicAccurate with human-readable locations (Barcelona → Opfikon) and real-world travel distanceBased on iplocation, sometimes inaccurate or outdated; no city-to-city distance context
Device context awarenessThe AI recognize the second IP is from a known AVD endpoint, and distinguish cloud-hosted vs. personal deviceSPL treats IPs as flat values; doesn’t infer context from device names unless explicitly encoded in a lookup
User role logicKnows the user is a subcontractor marked ONLY REMOTE, making virtual desktop infrastructure login expected.SPL cannot infer or evaluate user roles without joining external HR or identity data.
Session analysisThe AI considered whether logins belong to the same session or different contexts (VDI vs. local)SPL can’t link session context unless it’s engineered manually (e.g., through token IDs, session IDs)
False positive suppression logicAdvises suppression based on trusted IP/device combinations, remote work patterns, and device typeRequires custom correlation searches, lookups, or external context ingestion
ML signal interpretationDistinguishes why the alert triggered (ML_NEW_USER, ML_NEW_GEO_ISP) and de-risks based on identity validationSPL will just flag those risks; human/AI interpretation must be layered on top
Analyst judgmentEmulates how a human SOC analyst would reason through intent, identity, and environmentSPL doesn’t support nuanced intent modeling without external logic or ML/UEBA tooling
Output qualityClear, contextual, explainable narrative with defensive recommendationsSPL produces tabular alerts and risk scores; lacks explanation without additional dashboards or notes