
Summary
This detection rule identifies attempts to manipulate Windows Defender settings, specifically targeting the removal of certain configuration preferences through the PowerShell command 'Remove-MpPreference'. It activates when the Script Block Logging feature is enabled on Windows systems, ensuring that all PowerShell script blocks executed are logged for security analysis. The rule's detection logic focuses on identifying specific keywords within the script blocks that suggest tampering, particularly related to Controlled Folder Access and Attack Surface Reduction (ASR) configurations. The presence of these keywords in the context of using 'Remove-MpPreference' indicates a potentially malicious action aimed at compromising the system's defensive capabilities. This rule can be particularly useful for monitoring and responding to attacks that seek to disable security features to facilitate other malicious activities.
Categories
- Endpoint
- Windows
Data Sources
- Script
- Logon Session
- Process
Created: 2022-08-05