heroui logo

Microsoft Defender Tamper Protection Trigger

Sigma Rules

View Source
Summary
This detection rule for Microsoft Defender Tamper Protection is designed to identify blocked attempts to modify critical settings that enhance system security, specifically focusing on the real-time and behavior monitoring features of the Defender. The rule triggers on Windows Event ID 5013, which registers events when disabling specific anti-malware settings via attempted modifications. The settings monitored are related to disabling anti-spyware, anti-virus functions, real-time monitoring, behavior monitoring, and file scanning options. This rule is key in preventing possible breaches by alerting administrators to actions that could expose systems to vulnerabilities if system defenses are weakened. The detection is significant due to its high severity level, indicating that any tampering attempts may pose a serious risk to the integrity of endpoint security. Administrators should remain vigilant, especially during testing phases when legitimate changes may also trigger alerts, warranting further investigation to confirm the intent of any modification attempts.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Logon Session
Created: 2021-07-05