heroui logo

All Rules Have Been Deleted From The Windows Firewall Configuration

Sigma Rules

View Source
Summary
This rule detects instances where all rules in the Windows Defender Firewall configuration have been deleted, which can indicate malicious activity aimed at creating a security vulnerability in the system. The detection is based on the generation of specific Windows Event IDs (2033 and 2059) that correspond to firewall changes. Additionally, the rule includes filtering conditions to ensure that the modifications are not made by the legitimate system service (`svchost.exe`) or the Windows Defender platform executable (`MsMpEng.exe`). The rule aims to provide a high level of alertness to administrators regarding potential unauthorized alterations to critical security configurations.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Firewall
Created: 2023-01-17