heroui logo

Disabling Windows Defender WMI Autologger Session via Reg.exe

Sigma Rules

View Source
Summary
This detection rule identifies attempts to disable Windows Defender's Event Tracing for Windows (ETW) Autologger sessions through the use of the 'reg.exe' command-line tool. Attackers may use this technique to stop logging of critical security events associated with Windows Defender, specifically targeting the 'DefenderApiLogger' and 'DefenderAuditLogger' sessions. The detection logic looks specifically for the command line inputs that indicate a change in the 'Start' value to '0' for these Autologger sessions. This adjustment effectively blinds security monitoring tools by preventing essential security-related events from being logged. As such, detection of this behavior is crucial in identifying potential evasive tactics used by malicious actors to hinder defense mechanisms.
Categories
  • Windows
  • Endpoint
  • Other
Data Sources
  • Process
  • Command
Created: 2025-07-09