Given access to compromised or at-risk systems and local administrator or domain administrator permissions, the operator will identify and disable unnecessary or suspicious services to disrupt potential attacker persistence and limit lateral movement.
Operator Note: Adversaries frequently abuse Windows services to maintain persistence, escalate privileges, or evade detection. Disabling unneeded or malicious services is a key containment tactic, but should be executed carefully to avoid service disruption.
All unauthorized or non-essential services on impacted hosts are disabled, and operators have validated these services are no longer running.
Get-Service | Select-Object Name, DisplayName, Status, StartType
sc query type= service state= all
services.msc
Operator Note: Use GUI for easier visual review when dealing with complex or unfamiliar services.
Look for:
Get-WmiObject Win32_Service | Select-Object Name, DisplayName, State, StartMode, PathName
Set-Service -Name "ServiceName" -StartupType Disabled
Stop-Service -Name "ServiceName" -Force
sc config "ServiceName" start= disabled
sc stop "ServiceName"
Operator Note: Always stop the service after disabling to ensure it is not running.
Get-Service -Name "ServiceName"
Expected Status:
Status Name DisplayName
------ ---- -----------
Stopped ServiceName Example Service
Get-Service | Export-Csv .\ServicesBackup.csv -NoTypeInformation
$suspiciousServices = @("badsvc1","malwareupdate","strangeSvc")
foreach ($svc in $suspiciousServices) {
Set-Service -Name $svc -StartupType Disabled
Stop-Service -Name $svc -Force
}
Operator Note: Update the array with service names identified during review.
Tool | Platform | Use Case |
---|---|---|
PowerShell (Get-Service, Set-Service) | Windows | Bulk review and disabling |
sc.exe | Windows | CLI method for disabling |
services.msc | Windows | Visual review and disable (manual) |
Sysinternals Autoruns | Windows | Detect services and startup programs |
WMI | Windows | Advanced service interrogation |
Microsoft Docs - Service Cmdlets in PowerShell
sc.exe command-line reference
Sysinternals Autoruns
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.0 | Fully generated operator guide for disabling Windows services, multi-method instructions, forensic guidance | Leo |