heroui logo

Windows AppLocker Rare Application Launch Detection

Splunk Security Content

View Source
Summary
The Windows AppLocker Rare Application Launch Detection rule is designed to monitor and identify anomalies in application usage within a Windows environment through the analysis of AppLocker event logs. The rule aggregates application launch data over time, enabling the detection of applications that are launched infrequently. By calculating the average and standard deviation of the launch counts, it sets upper and lower thresholds, flagging any applications that significantly exceed or fall below these bounds. This detection approach is crucial for recognizing potentially malicious activities, as attackers might exploit rare or unusual applications to execute unauthorized code, leading to potential system compromise. The analytic is especially useful in environments where AppLocker is implemented, providing an additional layer of security against misused software.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1218
  • T1562
Created: 2024-11-13