
Summary
This rule detects the deletion of the detection history in Windows Defender, which is indicated by Event ID 1013. It primarily serves as an informational alert, highlighting instances when the history of detected infections is removed. Such deletions could be legitimate; for instance, users may choose to clear their logs for maintenance purposes. However, unauthorized or suspicious log deletions could signal attempts of evading detection by a malicious actor. The rule is based on the Windows Defender logging service, and the detection is established through the presence of a specific event in the system logs.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Application Log
Created: 2020-08-13