
Summary
This detection rule identifies changes made to Windows Defender's configuration via PowerShell scripts that add exclusions. The rule activates when specific keywords related to exclusion paths, extensions, processes, or IP addresses are detected in the PowerShell script block logs. Monitoring these actions is crucial as they may signify attempts to evade detection by disabling important security functions. To ensure accurate detection, Script Block Logging must be enabled on Windows systems. The alerts generated by this rule can be instrumental in identifying potential malicious intentions, as attackers often manipulate Defender exclusions to facilitate their operations without triggering any immediate alarms.
Categories
- Endpoint
- Windows
Data Sources
- Script
- Windows Registry
Created: 2022-09-16