
Summary
This rule is designed to detect tampering with the permissions of Windows Event Log channels via modifications to the registry. Specifically, it focuses on changes made to the Security Descriptor Definition Language (SDDL) strings associated with Event Log services. Unauthorized modifications to these strings can restrict or prevent access to event logs, facilitating defense evasion tactics by controlling who can read or modify logs. The detection mechanism utilizes specific registry paths where these permissions are defined, including the standard EventLog and CustomSD locations. If changes are detected that suggest the permissions have been altered, it indicates potential malicious activity aimed at concealing actions from system administrators and security personnel. This rule is particularly relevant in scenarios where unauthorized users may attempt to obscure their footprints or bypass security monitoring mechanisms embedded within Windows systems.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1562.002
Created: 2025-01-16