
Summary
This detection rule monitors the status of the Windows Defender antivirus feature, specifically focusing on its potential disablement. When the Windows Defender virus scanning capability is turned off, it could signify either user-initiated administrative actions or malicious attempts to undermine the endpoint's defenses, thereby allowing for the undetected operation of malware. The rule is premised on the detection of Event ID 5012, which is specifically logged when users disable the Windows Defender virus scanning feature. Given the importance of antivirus measures in safeguarding against malicious software, any event marking the discontinuation of these services merits high-level alerting and response actions.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Application Log
- Logon Session
ATT&CK Techniques
- T1562.001
Created: 2020-07-28