heroui logo

Audit Policy Tampering Via NT Resource Kit Auditpol

Sigma Rules

View Source
Summary
This rule is designed to detect potential tampering with audit policies on Windows systems via the use of the outdated auditpol binary found in the NT resource kit. Threat actors may exploit this utility to weaken audit policies, thereby reducing the ability to detect malicious activities. The primary mechanism involves executing the command line with specific parameters that correspond to disabling or altering existing audit logs related to different aspects of security, such as logon events, privileges, and security objects. By monitoring for these command line patterns, the rule aims to identify and alert on suspicious attempts to modify the audit policy in a manner that would facilitate evasion of security measures.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2021-12-18