
Summary
The 'Windows Defender ASR Audit Events' detection rule monitors and analyzes Windows Defender Attack Surface Reduction (ASR) audit events. ASR is part of the Windows Defender Exploit Guard, designed to prevent actions that pose risks of exploitation by malware. These rules are applied to various applications and processes, generating events whenever an action is attempted that would commonly be blocked under ASR rules but is allowed for auditing. The detection focuses on specific Windows Event Log codes, including 1122, 1125, 1126, 1132, and 1134, which correlate to different ASR audit events. This rule aggregates data related to these events, extracting statistics, event times, and relevant application/process details. Additionally, it employs a lookup table to relate event IDs to specific ASR rules, which aids in context and threat assessment.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1059
- T1566.001
- T1566.002
Created: 2024-11-13