heroui logo

Firewall Allowed Program Enable

Splunk Security Content

View Source
Summary
The 'Firewall Allowed Program Enable' detection rule identifies unauthorized modifications to firewall settings that permit specific applications on the endpoint. By analyzing process creation and command line arguments associated with firewall rule changes using data from EDR agents, this rule highlights potentially malicious activities that may compromise network security. Detection is primarily focused on events where processes related to enabling or adding firewall rules are logged. This is critical since attackers might exploit legitimate processes to reconfigure firewall rules, thereby facilitating the execution of unauthorized applications that could maintain persistence or escalate privileges within a compromised environment. To implement this detection, specific logging sources must be ingested, and data must be properly normalized and mapped using the Splunk Common Information Model (CIM). Regular tuning of the detection rule may be necessary to account for potential false positives caused by legitimate administrative activities.
Categories
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1562.004
  • T1562
Created: 2024-11-13