heroui logo

Windows Defender ASR Rules Stacking

Splunk Security Content

View Source
Summary
The rule titled 'Windows Defender ASR Rules Stacking' is designed to identify significant security events generated by Microsoft Defender, particularly those related to the Exploit Guard and Attack Surface Reduction (ASR) features. It operates by monitoring specific Event IDs, which signify block actions and audit logs associated with ASR rules. Notably, the rule focuses on events such as 1121 (blocked operations), 1122 (audit logs), 1126, 1129 (user overrides), and configuration changes indicated by Event ID 5007. A critical component of this detection is a lookup mechanism that correlates ASR rule GUIDs with their descriptive names, allowing for enhanced analysis of detected events. The rule aims to spot unauthorized operations, security breaches, and potential policy violations by aggregating events and presenting them in a structured manner. The analytical function additionally deploys a search mechanism in Splunk that counts events, captures timestamps, and filters results using a predefined template, enhancing the rule's ability to flag suspicious activities effectively.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Windows Registry
  • Windows Registry
  • Windows Registry
  • Windows Registry
  • Windows Registry
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1566.001
  • T1566.002
  • T1059
Created: 2024-11-13