heroui logo

Windows Important Audit Policy Disabled

Splunk Security Content

View Source
Summary
This detection rule identifies any changes to important Windows audit policies, specifically when success or failure auditing is disabled. Utilizing EventCode 4719 from Windows Security Event Logs, the rule reacts to modifications that may indicate malicious activities such as an attacker tampering with audit settings to avoid detection. The disabling of these policies can have severe implications, potentially leading to data breaches, privilege escalation, or complete network compromise. The analytics provided will alert security teams to investigate further the legitimacy of these changes and understand the intent behind them, thus ensuring system integrity and security compliance.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1562.001
  • T1562.002
Created: 2025-01-27