
Summary
This detection rule focuses on identifying the execution of the `auditpol.exe` command with the '/clear' argument on Windows systems, which is used to clear audit policies. Such an action typically indicates potential attempts at evading detection by adversaries or Red Teams, as it limits the data available for auditing. The rule utilizes data from Endpoint Detection and Response (EDR) agents, particularly analyzing Sysmon EventID 1 and Windows Event Log Security 4688 to track process names and command-line arguments. By filtering out benign variations, the rule aims to identify potentially malicious behavior that could lead to significant security compromises, including lateral movement within a network. This detection is pivotal as clearing audit logs can hinder forensic investigations and responses to security incidents.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1562
- T1562.002
Created: 2025-01-27