heroui logo

Sysmon Blocked Executable

Sigma Rules

View Source
Summary
The Sysmon Blocked Executable rule is designed to detect instances where executables are being blocked based on predefined policies in a Sysmon environment. This detection is triggered by observing the 'FileBlockExecutable' event (Event ID 27) generated by Sysmon, which signifies that an executable file was denied execution due to security policies. It serves as a means to enforce application whitelisting or other blocking strategies intended to prevent unauthorized or malicious software from running. Sysmon, a system monitoring tool, is leveraged here to provide visibility into the activities occurring on a Windows system at a granular level, allowing defenders to respond swiftly to potential threats. The rule has a high severity level due to its critical role in the defense against advanced persistent threats that utilize executable files to compromise systems. Because the rule focuses specifically on indications of policy violations for executable files, the likelihood of false positives is low, particularly when robust whitelisting practices are in place.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
  • File
Created: 2022-08-16