
Summary
This rule is designed to detect suspicious changes made to Windows system firewall rules that permit the execution of applications from notable and potentially malicious file paths. It utilizes data sourced from Endpoint Detection and Response (EDR) agents, focusing on command line executions that modify these firewall rules. The significance of this detection lies in its ability to identify potential attempts by adversaries to circumvent firewall protections and execute unauthorized code, which could lead to system compromises, data breaches, or persistence within an environment. The analytical detection is particularly triggered when processes related to enabling new firewall rules for specified paths are executed, making it crucial for monitoring security in Windows environments.
Categories
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- Certificate
- WMI
- Cloud Storage
- Internet Scan
- Persona
- Group
- Application Log
- Logon Session
- Instance
- Sensor Health
- File
- Drive
- Snapshot
- Command
- Kernel
- Driver
- Volume
- Cloud Service
- Malware Repository
- Network Share
- Network Traffic
- Scheduled Job
- Firmware
- Active Directory
- Service
- Domain Name
- Process
ATT&CK Techniques
- T1562.004
- T1562
Created: 2024-12-10