
Summary
This detection rule monitors for suspicious alterations in the Windows Defender configuration to identify potential security risks. It specifically looks for changes recorded in the Windows Event Log under Event ID 5007. The parameters being tracked include the disabling of anti-spyware functionality, the disabling of scanning for removable drives, the blocking of first-seen items, and adjustments related to SpyNet reporting. Alterations to these settings may indicate attempts at evading detection mechanisms, potentially leading to an increased risk of malware activities or other malicious exploits. Investigation is crucial as legitimate changes can be made by administrators, while unauthorized modifications may signify malicious intent.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Application Log
Created: 2022-12-06