
Summary
This detection rule monitors IIS server configurations for unauthorized changes that disable HTTP logging for successful requests. By observing modifications where the `dontLog` attribute of the `httpLogging` section is set to 'true', this rule aims to identify potential evasion tactics used by attackers to hide their activities from logs. The rule is relevant in the context of web server security, as disabling logging can obscure attack attempts and actions taken against the server, thus creating blind spots for defenders. The associated EventID of 29 indicates a configuration change, which allows for proactive identification of misconfiguration or tampering attempts. For further detailed insights, reference links include official IIS logging configuration guides and related security blogs that discuss web vulnerabilities.
Categories
- Web
- Windows
- Cloud
Data Sources
- Windows Registry
- Application Log
- Service
Created: 2024-10-06