heroui logo

Windows Defender Exclusions Added - Registry

Sigma Rules

View Source
Summary
This detection rule captures the configuration changes related to Windows Defender, specifically focusing on the setting of exclusions within the system registry. When an administrator adds exclusions for certain files, folders, or processes in Windows Defender, this can be a tactic employed by adversaries to bypass security measures. By monitoring the registry keys tied to the Windows Defender exclusions, the rule aims to identify potential circumvention attempts that may allow malware to operate undetected. The rule is triggered when the relevant registry path, specifically containing '\Microsoft\Windows Defender\Exclusions', is modified. This rule is actively tailored for Windows environments and targets potential misuse of administrative privileges to enhance the security posture by providing alerts on critical changes to antivirus settings.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2021-07-06