
Summary
This detection rule focuses on identifying suspicious activity related to the Windows command-line utility 'logman.exe,' which is often used for managing Event Tracing for Windows (ETW) sessions. The rule triggers when 'logman.exe' is executed with commands that stop or delete existing Windows trace sessions, which could be indicative of an attempt to evade detection by disabling logging capabilities. Legitimate administrative actions are noted as potential false positives, highlighting the importance of contextual awareness when analyzing alerts generated by this rule. The condition for triggering this detection includes monitoring for command-line arguments containing 'stop' or 'delete', combined with specific keywords associated with trace sessions. This makes it an effective tool for identifying potential attackers attempting to tamper with Windows event logs.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
Created: 2021-02-11