
Summary
This detection rule identifies issues arising from a DNS server on Windows systems where a specific plugin DLL, indicated in the system registry, fails to load. This may signify an error state or potential malicious activity trying to exploit or bypass security measures by manipulating DNS server plugins. The rule relies on monitoring relevant Event IDs (150, 770, 771) which are commonly logged in the context of DNS server operations. Detecting such errors can help in diagnosing potential vulnerabilities that adversaries might exploit for DNS hijacking or other attacks related to DNS manipulation.
Categories
- Windows
- Network
- On-Premise
- Infrastructure
Data Sources
- Windows Registry
- Application Log
- Network Traffic
Created: 2017-05-08