Overview
Enumerate applications available in SCCM. Applications represent software packages that can be deployed to collections, making them potential attack vectors for lateral movement and privilege escalation.Syntax
Parameters
The IP address, FQDN, or NetBIOS name of the SMS Provider to connect to
The three-character site code (e.g., “PS1”)
Filter applications by name pattern (supports partial matching)
Specify properties to retrieve (can be used multiple times)
Custom WQL WHERE clause for advanced filtering
Return count of results only
Display all application properties
Examples
Key Properties
| Property | Description | Values |
|---|---|---|
LocalizedDisplayName | Application name | User-defined |
ExecutionContext | Execution context | 0 (System), 1 (User) |
IsHidden | Hidden from console | True/False |
IsDeployed | Deployment status | True/False |
CreatedBy | Creator account | Domain\username |
DateCreated | Creation date | Timestamp |
DateLastModified | Last modification | Timestamp |
IsSuperseded | Superseded status | True/False |
Required Permissions
Application Administrator or Read-only Analyst role
Security Analysis
High-Risk Applications
High-Risk Applications
System Context Applications (ExecutionContext = 0):
- Run with SYSTEM privileges
- Potential privilege escalation vectors
- High impact for lateral movement
- Not visible in Software Center
- Often administrative or testing applications
- May contain sensitive functionality
- New applications may have weak security
- Testing applications with elevated privileges
- Recently added attack tools
Attack Vector Analysis
Attack Vector Analysis
Privilege Escalation:
- System context applications for privilege escalation
- Applications with excessive permissions
- Custom applications with security flaws
- Applications deployed to multiple systems
- Network-accessible applications
- Remote execution capabilities
- Applications with startup or scheduled execution
- Service-based applications
- Applications with persistence mechanisms
Application Intelligence
Application Types
Application Types
Standard Software:
- Microsoft Office, browsers, utilities
- Business applications and tools
- Development and administrative software
- Organization-specific software
- In-house developed applications
- Third-party business applications
- System administration utilities
- Security tools and agents
- Monitoring and management software
Deployment Patterns
Deployment Patterns
Broad Deployment:
- Standard software packages
- Security updates and patches
- Compliance and monitoring tools
- Specialized software for specific groups
- Administrative tools for IT staff
- Development tools for developers
Common Queries
Attack Opportunities
Application Abuse
Application Abuse
Malicious Applications:
- Create malicious applications for deployment
- Modify existing applications
- Abuse application deployment mechanisms
- Exploit applications with excessive privileges
- Abuse legitimate tools for malicious purposes
- Use applications for persistence and lateral movement
Deployment Manipulation
Deployment Manipulation
Deployment Targeting:
- Target specific collections with malicious applications
- Abuse existing deployment assignments
- Create new deployments for lateral movement
- Modify application content or commands
- Change deployment types and requirements
- Abuse application supersedence
Use Cases
Attack Vector Identification
Attack Vector Identification
High-Privilege Applications:
- System context applications for privilege escalation
- Administrative tools with elevated permissions
- Custom applications with security weaknesses
- Understand application deployment patterns
- Identify potential deployment targets
- Analyze organizational software usage
Lateral Movement Planning
Lateral Movement Planning
Application Deployment:
- Use legitimate deployment mechanisms
- Target specific device collections
- Abuse application execution contexts
- Applications with startup execution
- Service-based applications
- Scheduled application execution
Output Analysis
Application Categories
Application Categories
By Execution Context:
- System applications: High privilege, high risk
- User applications: Lower privilege, user-focused
- Visible applications: Standard user software
- Hidden applications: Administrative or testing tools
- System-created: Built-in or imported applications
- User-created: Custom or organizational applications
Related Commands
get deployments- Analyze application deploymentsget collections- Identify deployment targetsnew application- Create malicious applicationsremove application- Clean up applications