heroui logo

Modify Group Policy Settings

Sigma Rules

View Source
Summary
This rule detects attempts to modify Group Policy Objects (GPOs) which are used to implement various configurations and settings in Windows environments. Such modifications can be indicative of malicious activity designed to change security policies or to facilitate unauthorized actions. The detection mechanism focuses on the execution of the 'reg.exe' process, particularly when it interacts with specific parts of the Windows registry related to Group Policy settings. The criteria for triggering an alert include conditions where the `reg.exe` command is used to change keys associated with Group Policy refresh times or SmartScreen settings. Given that these modifications can lead to privilege escalation and tactics aimed at evading detection, monitoring for these activities is crucial. False positives may arise from legitimate administrative actions requiring similar registry modifications, hence potential confirmations from security teams are advised.
Categories
  • Windows
  • Endpoint
  • Application
  • Identity Management
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1484.001
Created: 2022-08-19