heroui logo

Suspicious Application Allowed Through Exploit Guard

Sigma Rules

View Source
Summary
The detection rule titled "Suspicious Application Allowed Through Exploit Guard" is designed to identify potential security risks by monitoring alterations made to the allowed applications list within the Windows Defender Exploit Guard. This rule is crucial for maintaining controlled folder access, which prevents unauthorized applications from modifying files in protected locations. The rule operates by inspecting registry changes, specifically focusing on the addition of applications to the key '\SOFTWARE\Microsoft\Windows Defender\Windows Defender Exploit Guard\Controlled Folder Access\AllowedApplications'. It scrutinizes registry modifications in specific directories such as \Users\Public\, \AppData\Local\Temp\, \Desktop\, and \Windows\Temp\ that typically harbor less secure applications. If there are any entries that match these criteria, it signals a possible attempt to evade protections set by the Exploit Guard. The overall goal is to ensure that only legitimate, needed applications are allowed in these sensitive areas, thereby mitigating the risks of malware and other malicious activities that could traverse through these openings.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2022-08-05