
Summary
This rule monitors actions taken by Windows Defender regarding malware detections on Windows platforms. It specifically looks for event IDs that indicate various stages of malware detection and response. The monitored event IDs include 1006 (Threat detected), 1015 (Threat action taken), 1116 (Threat removal), and 1117 (Threat quarantine). A detection is triggered when any of these events occur, indicating that Windows Defender has identified and managed a potential malware threat. The rule is intended to help organizations respond to security incidents by tracking Windows Defender's activities, ensuring timely investigations, and making it easier to correlate with other security events. windows-based systems are primarily targeted by this detection which is vital given the prevalence of Windows environments in enterprise settings. The rule operates with a high severity level, underscoring its importance in the detection landscape.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Application Log
- Service
Created: 2020-07-28