
Summary
This detection rule is designed to identify potential malicious actions involving the PowerShell cmdlets Add-MpPreference and Set-MpPreference, which are integral to managing Windows Defender Antivirus (AV) settings. By analyzing command lines that contain base64 encoded variants of these cmdlets, the rule aims to catch attempts by adversaries to modify or circumvent standard security settings in a Windows environment. The rule specifically looks for command lines with the keywords indicating the modification of Windows Defender's settings indicated by the presence of command-line arguments containing certain known base64 strings associated with these cmdlets. The detection thus helps to enforce security boundaries against defense evasion tactics, highlighting a significant risk to endpoint integrity by leveraging PowerShell's capabilities for command execution, including manipulative behaviors targeted at antivirus configurations.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1562.001
Created: 2022-03-04