
Summary
This alert rule is designed to identify attempts to disable or weaken the Windows Firewall using the command-line tool netsh.exe. Disabling the firewall can allow attackers to bypass security measures and facilitate unauthorized network access, which can lead to further attacks or lateral movement within a network. The EQL (Event Query Language) query specifically searches for process executions of netsh.exe with arguments indicating attempts to disable firewall rules. The rule incorporates multiple data sources, including Windows event logs and process activity logs, to detect these actions during the last 9 minutes. Risk score is assigned as medium, emphasizing the importance of investigation when alerts are triggered. The rule provides detailed investigation steps and management recommendations, highlighting the need to verify the legitimacy of the action and potentially initiate incident response procedures if suspicious activity is confirmed.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1562
- T1562.004
Created: 2020-02-18