
Summary
This detection rule focuses on identifying unauthorized modifications to the Windows Defender Attack Surface Reduction (ASR) registry settings through the monitoring of Windows Defender Operational logs, particularly EventCode 5007. ASR rules are crucial for blocking actions commonly exploited by malware to compromise systems. Therefore, any changes to these settings could signify an intention to undermine system defenses, which can lead to security breaches if executed by malicious actors. When deployed, the rule utilizes event logs to extract and analyze the new and old registry values related to ASR, allowing security teams to react to potential threats effectively. The implementation requires a proper setup for capturing Windows Defender logs and handling the mapping of ASR IDs to their corresponding names, further enhancing the detection capabilities.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1112
- T1059
Created: 2024-11-13