heroui logo

Windows Audit Policy Security Descriptor Tampering via Auditpol

Splunk Security Content

View Source
Summary
The rule detects tampering with the Windows Audit Policy Security Descriptor by identifying the execution of the `auditpol.exe` command with specific flags. It focuses on command-line arguments `"/set"` and `"/sd"`, which are used to alter the security parameters of audit policies. Such activities can indicate attempts by adversaries or Red Teams to evade security measures or limit audit capabilities. This behavior is critical because it signifies potential pre-attack reconnaissance and the ability to alter logging mechanisms to escape detection. Detection relies on process names and command-line data gathered from Endpoint Detection and Response (EDR) agents. If not addressed, these adjustments can facilitate lateral movement and deeper compromises within the network.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1562.002
Created: 2025-01-27