
Summary
The detection rule identifies instances of Windows event log clearing, specifically monitoring for Windows Security Event ID 1102 and System log event 104. Clearing logs can be a crucial indicator of malicious activity as it may suggest attempts to conceal tracks following unauthorized actions. The rule utilizes Windows event logs for alerting on such behavior, thereby aiding in early detection of potential security breaches. As attackers often utilize log-clearing to obstruct forensic investigations, this detection becomes imperative for subsequent analysis and correlation with other security alerts. This rule is designed to assist defenders in understanding and mitigating risks associated with log manipulation, which is seen as a tactic in cyber attacks to evade detection.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1070
- T1070.001
Created: 2024-12-10