
Summary
This detection rule identifies when a firewall rule is deleted on Windows systems through the use of the Netsh utility. The rule specifically monitors process creation events to catch instances of the 'netsh.exe' command being executed with arguments associated with deleting firewall rules. Detection is based on monitoring command-line activity to ascertain the presence of the 'firewall delete' commands, which may indicate an attacker’s attempt to evade detection by disabling firewall protections. The rule also includes a filter to potentially exclude benign activities associated with the Dropbox application, where similar command-line patterns may appear during legitimate operations. Given the medium level of severity, this rule is crucial for enhancing security against possible attacks aiming to disrupt firewall configurations. A comprehensive reference is provided for further analysis on detected activities through the provided task link.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-08-14