heroui logo

Defender Detection Passthrough

Panther Rules

View Source
Summary
The 'Defender Detection Passthrough' rule is designed to detect malicious activity potentially occurring on hosts or across connected platforms, including Azure, Microsoft 365, or Intune. It leverages Microsoft Defender's advanced hunting capabilities to identify advanced threats based on specific alert detection techniques pertaining to Defense Evasion, such as System Binary Proxy Execution and the usage of Regsvr32 and Rundll32. The rule is enabled and set to log data via Microsoft Defender XDR's advanced hunting features with a medium severity rating. Alerts can be triggered with a deduplication period of 60 minutes and a threshold of one, indicating that immediate attention is required when at least one of the specified attack patterns is detected. The rule references several detection events that may indicate a high severity finding, reinforcing its importance in threat mitigation efforts.
Categories
  • Endpoint
  • Cloud
  • Azure
  • Identity Management
  • Application
Data Sources
  • Process
  • Application Log
  • Network Traffic
  • Cloud Service
  • User Account
ATT&CK Techniques
  • T1218
  • T1218.010
  • T1218.011
Created: 2025-09-17