
Summary
This analytical rule detects the deletion of the main Windows Defender profile registry key, which is critical for maintaining the security posture of Windows systems. By using data from the Endpoint.Registry data model, it specifically tracks deletion actions within the Windows Defender registry path. This behavior is a strong indicator of potential tampering with security mechanisms, commonly associated with malware threats such as Remote Access Trojans (RATs). If this action is determined to be malicious, it could lead to the disabling of Windows Defender, significantly impairing the endpoint's defenses against future threats, thereby elevating the risk of system compromise.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1562.001
- T1562
Created: 2024-11-13