heroui logo

Win Defender Restored Quarantine File

Sigma Rules

View Source
Summary
This detection rule identifies the restoration of files from Microsoft Defender's quarantine. The specific event being monitored is indicated by EventID 1009, which is generated when a file that was previously flagged as malicious is restored back to its original location by an administrator or an automated process. As such, this restoration action could indicate legitimate administrative behavior or potential evasion tactics by an attacker attempting to recover a previously quarantined malicious file. The rule acts as a precautionary measure to alert security teams regarding any suspicious restoration activities that warrant further investigation. As attackers increasingly employ techniques to evade detection, monitoring these file restoration events becomes critical to maintaining the security posture of Windows-based environments.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
Created: 2022-12-06