heroui logo

Potential Suspicious Activity Using SeCEdit

Sigma Rules

View Source
Summary
The detection rule focuses on identifying potentially suspicious activities associated with the execution of 'secedit.exe', a Windows utility used for configuring and managing security policies. This rule aims to detect actions deemed suspicious, such as exporting or modifying security configurations or policies that may indicate unauthorized privilege escalation or alterations by an adversary. It operates by monitoring and analyzing process creation events for specific command-line arguments indicative of malicious actions, such as '/export' or '/configure', which are commonly used in the context of modifying security settings on a Windows system. The rule has been designed to help security teams identify legitimate administrative actions versus potentially harmful activities that could compromise security standards. Given that legitimate administrative use of 'secedit.exe' may yield false positives, security analysts should assess the context surrounding each alert before concluding actions taken with this utility.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-11-18