
Summary
This detection rule identifies modifications made to the Windows Defender exclusion list by monitoring specific Windows Event IDs related to registry changes. The rule specifically targets Event ID 4657, which logs changes to the registry keys associated with Windows Defender exclusions. The presence of such modifications could indicate suspicious activities, such as an attacker attempting to bypass the Defender's protections by adding new exclusions. The detection criterion is met when the registry path contains \Microsoft\Windows Defender\Exclusions\. This monitoring is crucial as it helps ensure that legitimate defenses against malware and other threats are not being circumvented. Administrators may generate false positives if they intentionally create exclusions for legitimate purposes, thus requiring review to distinguish between benign and malicious modifications.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Logon Session
- Application Log
Created: 2019-10-26