Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 975

Scheduled Task Persistence

What is Scheduled Task Persistence?

Scheduled Task PersistencePersistence and execution technique in which an attacker creates or modifies a Windows scheduled task to run their payload on a trigger such as logon, boot, or a timer.


Scheduled task persistence (MITRE ATT&CK T1053.005) abuses the Windows Task Scheduler. Attackers use schtasks.exe, the ITaskService COM interface, or direct XML drops to %SystemRoot%\System32\Tasks to register tasks that run at boot, on logon, when a user is idle, on a calendar schedule, or on events. Tasks running under SYSTEM, NETWORK SERVICE, or a privileged service account give both persistence and privilege. Modern variants hide tasks by deleting the SD value or by registering them with empty principals, requiring detection beyond the GUI. Defenses: monitor Security event 4698 (task created) and 4702 (task updated), Sysmon event 1 for spawning of schtasks.exe, baseline expected tasks, and restrict Create Task user rights.

Examples

  1. 01

    An hourly task named "GoogleUpdaterTaskUser" that runs an unsigned binary in %APPDATA%.

  2. 02

    A task with a logon trigger configured to execute a PowerShell loader under SYSTEM.

Frequently asked questions

What is Scheduled Task Persistence?

Persistence and execution technique in which an attacker creates or modifies a Windows scheduled task to run their payload on a trigger such as logon, boot, or a timer. It belongs to the Attacks & Threats category of cybersecurity.

What does Scheduled Task Persistence mean?

Persistence and execution technique in which an attacker creates or modifies a Windows scheduled task to run their payload on a trigger such as logon, boot, or a timer.

How does Scheduled Task Persistence work?

Scheduled task persistence (MITRE ATT&CK T1053.005) abuses the Windows Task Scheduler. Attackers use schtasks.exe, the ITaskService COM interface, or direct XML drops to %SystemRoot%\System32\Tasks to register tasks that run at boot, on logon, when a user is idle, on a calendar schedule, or on events. Tasks running under SYSTEM, NETWORK SERVICE, or a privileged service account give both persistence and privilege. Modern variants hide tasks by deleting the SD value or by registering them with empty principals, requiring detection beyond the GUI. Defenses: monitor Security event 4698 (task created) and 4702 (task updated), Sysmon event 1 for spawning of schtasks.exe, baseline expected tasks, and restrict Create Task user rights.

How do you defend against Scheduled Task Persistence?

Defences for Scheduled Task Persistence typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Scheduled Task Persistence?

Common alternative names include: Schtasks persistence, Task Scheduler abuse.

Related terms