heroui logo

Windows Audit Policy Excluded Category via Auditpol

Splunk Security Content

View Source
Summary
This detection rule identifies when the `auditpol.exe` tool is executed with specific command-line arguments: `/set` and `/exclude`. This behavior indicates an attempt to suppress per-user audit policies on Windows systems, potentially signifying actions taken by adversaries aiming to evade detection and manipulate logging mechanisms. By leveraging data from Endpoint Detection and Response (EDR) agents, including Sysmon and Windows Event Logs, the rule pinpoints relevant process execution patterns that match the criteria for suspicious activity. Such tactics can allow attackers to bypass security controls, thus facilitating further compromise or lateral movement across the network.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • Process
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1562
  • T1562.002
Created: 2025-01-27