
Summary
This detection rule identifies unauthorized modifications to the Windows Registry that involve the addition of filters to the Windows Filtering Platform (WFP). Such modifications can potentially disable or bypass security tools and Endpoint Detection and Response (EDR) agents, making it easier for malicious actors to operate undetected. The rule specifically looks at registry keys associated with persistent filters and flags any alteration that occurs outside of typical processes, specifically focusing on instances where the modifying process is not one of the trusted 'svchost.exe' instances. It effectively alerts administrators to possible malicious activity aimed at silencing endpoint security measures.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2025-10-23