
PowerShell Defender Threat Severity Default Action Set to 'Allow' or 'NoAction'
Sigma Rules
View SourceSummary
This detection rule monitors the execution of the PowerShell cmdlet 'Set-MpPreference', which is utilized to modify the default threat severity action of Windows Defender. Specifically, it focuses on scenarios where the default actions are set to 'Allow' (6) or 'NoAction' (9). This is particularly concerning as it represents a major deviation from recommended security practices, potentially allowing threats to go unmitigated. By disabling automatic defenses against specific threat levels, attackers can manipulate the system defenses more easily before executing malicious payloads. The detection logic implemented captures instances where relevant command-line arguments are present in process creation logs, ensuring proactive surveillance of configurations that might compromise endpoint security.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2025-07-11