
Summary
This detection rule monitors write access requests to Windows Defender exclusion registry keys, indicating potential attempts by malicious entities to alter security settings. When attackers gain access to these settings, they may attempt to add file or path exclusions in Windows Defender, which can thereby allow malicious files to execute unimpeded by the security software. The rule examines specific event IDs (4656 and 4663) related to access requests to registry keys under the path '\Microsoft\Windows Defender\Exclusions\'. The intention is to identify unauthorized changes that may signify an attempt to evade detection by malware evasion techniques.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Logon Session
Created: 2019-10-26