
Summary
This detection rule focuses on monitoring and identifying potential failures or issues with Windows Defender's Real-Time Protection feature. Specifically, it looks for specific Event IDs (3002, 3007) which are indicative of failures related to the Real-Time Protection service. Additionally, the rule includes a filter that checks for certain feature names and reasons for failures, allowing for a more granular detection of relevant events. The intention behind this detection is to alert system administrators of potential misconfigurations or failures within Windows Defender that could expose systems to security risks due to inadequate malware protection. As an added context, the rule includes references to guidance from Microsoft on investigating attacks, possibly linked to an ongoing campaign threatening endpoint security. This is important in the context of security operations where maintaining a robust and operational defense against malware is critical. The rule operates on Windows-based systems and is tagged under defense evasion tactics, highlighting that attackers may attempt to disable or complicate security measures like Windows Defender, thereby necessitating this continual monitoring.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Application Log
Created: 2023-03-28