heroui logo

Powershell Disable Security Monitoring

Splunk Security Content

View Source
Summary
This analytic rule identifies attempts to disable Windows Defender's real-time behavior monitoring via PowerShell commands. It specifically targets the use of certain parameters in the 'Set-MpPreference' command that are associated with disabling critical security features. Such actions are often associated with malicious activities, including techniques used by malware types like Remote Access Trojans (RATs) and bots, to evade antivirus detection mechanisms. If a detection is confirmed, it indicates potential broader security implications, such as the possibility of data exfiltration, further compromises, or unauthorized persistent access within an environment. The detection leverages endpoint telemetry from sources such as Sysmon and Windows Event Logs to identify these commands and track their execution details.
Categories
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-12-10