
Summary
This rule aims to detect the creation of new Windows firewall rules using the Netsh command-line utility. The detection focuses specifically on instances where new firewall rules are added by monitoring the process creation events associated with netsh.exe. The rule triggers when certain command line parameters (typically indicating the addition of a firewall rule) are used. This is particularly relevant during potential malicious activities, as attackers may modify firewall settings to enable unauthorized inbound or outbound traffic. By analyzing the process creation logs for netsh.exe, security analysts can identify actionable events that may require further investigation, especially if the command intends to allow traffic for applications such as Dropbox, which could be misused for exfiltration of sensitive data. Additionally, the rule distinguishes legitimate administrative commands by filtering out commonly known command lines for legitimate applications, which aids in reducing false positives.
Categories
- Windows
- Endpoint
- Network
Data Sources
- Process
- Application Log
Created: 2019-01-29