heroui logo

Windows Event Logs Cleared

Elastic Detection Rules

View Source
Summary
The rule titled 'Windows Event Logs Cleared' is designed to detect attempts to clear the Windows event log stores. This action is typically performed by attackers to evade detection and erase forensic evidence, making it a crucial aspect of security monitoring. The rule employs a query that looks for specific actions related to log clearing within the defined timeframe of 'now-9m'. It targets logs from sources including 'winlogbeat-*', 'logs-system.*', and 'logs-windows.*'. By analyzing actions such as 'audit-log-cleared' or 'Log clear', alongside ensuring they are not triggered by the 'AD FS Auditing' provider, the rule seeks to highlight suspicious activity that warrants further investigation. Responding to alerts generated by this rule can involve a comprehensive threat analysis process, utilizing responses that scan for malware, account exposures, and reviewing userbehaviors leading to the log clearing events. This way, organizations can react appropriately to potential threats and implement measures to prevent recurrence.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Application Log
  • File
ATT&CK Techniques
  • T1070
  • T1070.001
Created: 2020-11-12