heroui logo

Windows Impair Defense Disable PUA Protection

Splunk Security Content

View Source
Summary
This detection rule identifies modifications in the Windows registry that lead to the disabling of Windows Defender's PUA (Potentially Unwanted Application) protection by checking for the registry value 'PUAProtection' being set to 0. Utilizing Sysmon Events 12 and 13, the rule monitors changes in the registry paths relevant to Windows Defender. Disabling PUA protection, although sometimes policy-driven, poses a security risk as it can allow unwanted applications such as adware and browser toolbars to be introduced, potentially compromising system integrity and negatively impacting user experience. The rule is designed to trigger alerts when such modifications are detected, facilitating responses to potential threats against endpoint security.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • User Account
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-11-13