
Summary
The detection rule aims to identify when new exclusions are added to the Windows Defender antivirus settings. It utilizes the specific event ID 5007 that logs configuration changes in the Windows Defender service (windefend). The key part of the rule is to monitor for changes where the NewValue in the event log includes indications of exclusion paths, specifically involving the Windows Defender exclusions directory. This is particularly useful for detecting potential evasion tactics where adversaries might attempt to bypass antivirus defenses by adding exclusions, which can hinder the detection of malicious files. Administrators performing legitimate changes may trigger false positives, hence they are noted as a consideration. This rule is relevant for environments that rely on Windows-based security and monitoring solutions, and helps ensure that any unauthorized modifications to the antivirus exclusion settings are quickly identified and acted upon.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Application Log
Created: 2021-07-06