heroui logo

Important Windows Event Auditing Disabled

Sigma Rules

View Source
Summary
The rule "Important Windows Event Auditing Disabled" is designed to detect instances where key Windows event auditing has been disabled. In particular, it focuses on critical events such as 'Process Creation' and 'Logon' events, which are essential for monitoring user activities and system changes. Utilizing Event ID 4719, the rule assesses changes to the audit policy by scrutinizing particular subcategories associated with various system events. When critical subcategory GUIDs are identified along with specific audit policy change codes (%%8448 for enabling auditing and %%8450 for disabling it), alerts are generated to indicate potential evasion tactics often employed by malicious actors. The setup allows differentiated detection of both successful and failed audit policy changes, aiming to maintain sound security posture and alert security teams to possible tampering with auditing settings. The rule has been classified at a high severity level, given its importance in maintaining oversight of security-critical auditing practices.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
Created: 2023-06-20