heroui logo

Disable Microsoft Defender Firewall via Registry

Sigma Rules

View Source
Summary
This threat detection rule focuses on identifying attempts to disable the Microsoft Defender Firewall via the Windows Registry. Adversaries often execute techniques to bypass network security controls, and one common method is to alter firewall settings. This rule specifically looks for changes to the registry key that controls the firewall's operational status. The presence of the DWORD value set to 0 (indicating the firewall is disabled) in the key 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\EnableFirewall' is an indication of potential malicious activities aimed at weakening the system's defenses.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
ATT&CK Techniques
  • T1562.004
Created: 2022-01-09