
Summary
This detection rule monitors the Windows Defender Firewall for changes regarding the deletion of one or more firewall rules. Specifically, it looks for Event IDs 2006 and 2052, which indicate that a firewall rule has been removed. The rule employs various filters to ensure that deletions from specific trusted applications (like those typically found within the Program Files directories) do not trigger false positives. This includes filters for common Windows application paths and for the Windows defender application itself. A medium alert level signifies that while this action could be legitimate, it may also signify potential malicious activity aimed at evading network defenses. The references provided give further insights into Windows firewall operation and event logging, aiding in understanding the context of such rule deletions.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Firewall
Created: 2022-02-19