
Summary
This detection rule identifies instances where the Windows Firewall is disabled via the 'netsh.exe' command-line utility. The rule primarily works by monitoring process creation events, particularly targeting the use of 'netsh.exe' to perform firewall configuration changes. When the command line includes keywords indicative of disabling the firewall (e.g., 'firewall set opmode disable' or 'advfirewall set state off'), it triggers an alert. The rule is designed to help administrators and security teams detect potential evasion attempts by attackers wishing to minimize their footprint or disable protective measures in a compromised environment. Knowing that legitimate administrative tasks may also use these commands, it is crucial to analyze the context of such alerts to determine their legitimacy, thus helping to reduce false positive rates in the security system.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Command
- Firewall
ATT&CK Techniques
- T1562.004
Created: 2019-11-01