
Summary
This rule is designed to detect instances where a revoked kernel driver is loaded into the Windows operating system. Kernel drivers play a crucial role in communication between the operating system and hardware devices, and the loading of a revoked driver can indicate potential security breaches, misuse, or attacks aimed at escalating privileges on the system. The rule monitors Windows Event IDs 3021 and 3022, which are generated when a driver is loaded and its integrity is validated against the code integrity policies in place. If the driver is found to be revoked, the rule triggers an alert indicating a possible integrity violation, which could be a precursor to unauthorized access or other malicious activities. The detection is built on the Code Integrity operational logs provided by Windows, hence requiring those logs to be available for effective monitoring.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
- Application Log
Created: 2023-06-06