heroui logo

Windows PowerShell Disable HTTP Logging

Splunk Security Content

View Source
Summary
The detection rule titled 'Windows PowerShell Disable HTTP Logging' identifies malicious attempts to disable HTTP logging on Windows systems by monitoring the usage of specific PowerShell cmdlets. It specifically looks for commands such as `get-WebConfigurationProperty` and `Set-ItemProperty`, which are used to manipulate HTTP logging configurations. A key focus is on script blocks that contain references to HTTP logging properties, particularly instances where logging is disabled ('false' or 'dontLog'). This behavior is critical to security monitoring, as adversaries often attempt to disable logging to erase tracks of their activities, making forensic analysis and incident response more challenging. If confirmed as malicious intent, this activity signifies a potential breach and could indicate that attackers are trying to maintain persistence within the environment without detection. The rule leverages PowerShell Script Block Logging (EventCode 4104), ensuring that it captures relevant script activities effectively.
Categories
  • Endpoint
Data Sources
  • Pod
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1562
  • T1562.002
  • T1505
  • T1505.004
Created: 2024-11-13