heroui logo

Windows Firewall Rule Deletion

Splunk Security Content

View Source
Summary
The Windows Firewall Rule Deletion detection rule identifies instances where a Windows Firewall rule is removed from the system. Such deletions may expose the system to various security vulnerabilities and may indicate malicious activities, such as an attacker attempting to bypass security controls or malware disabling protections for persistence and command-and-control operations. The detection specifically relies on Event ID 4948 from the Windows Security Event Logs, which logs events associated with the deletion of firewall rules, including crucial details like the rule name, protocol involved, port numbers, and the user account responsible for the action. Monitoring these deletions is critical for identifying unauthorized access and maintaining a robust network security posture. The rule correlates deletion events with other security logs to provide better context and ensure that security teams can respond to anomalies swiftly. Implementing the detection involves ensuring the relevant Windows Security Event Logs are ingested into a security monitoring solution such as Splunk, along with necessary configurations for accurate parsing and analysis.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1562.004
Created: 2025-03-19