
Summary
This rule detects the addition of a new "Allow" firewall rule to the Windows Firewall Exception List via the Windows Management Instrumentation (WMI) process, WmiPrvSE.EXE. This could indicate unauthorized modifications potentially made by an attacker using PowerShell cmdlets, such as "New-NetFirewallRule" or through WMI CIM classes like "MSFT_NetFirewallRule". In a detected event, the log entries will mention specific Event IDs (2004, 2071, 2097) and an Action of 3, which signifies that a new rule is being added. The detection should be used to monitor and either detect or prevent unauthorized changes to firewall settings, which can be a crucial step in defense evasion techniques used by attackers.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- WMI
- Firewall
ATT&CK Techniques
- T1562.004
Created: 2024-05-10