
Summary
This detection rule monitors for potentially harmful PowerShell commands that attempt to remove the Windows Defender directory. It uses PowerShell Script Block Logging to capture scripts that include the 'rmdir' command in combination with the Windows Defender file path. The significance of this detection lies in the fact that removing Windows Defender can disable critical endpoint protection, leaving the system vulnerable to further attacks. The rule counts occurrences of such commands, tracks the first and last times they were detected, and associates this activity with specific users and systems. Any identification of such commands is considered suspicious and may warrant deeper investigation to confirm intent and context.
Categories
- Endpoint
Data Sources
- Pod
ATT&CK Techniques
- T1562.001
- T1562
- T1059.001
Created: 2024-11-13