
Summary
This detection rule monitors modifications to the Windows Registry to identify attempts to disable the Windows Firewall. Specifically, it looks for changes to the `EnableFirewall` setting in both the Standard and Domain profiles. If a malicious actor or script modifies this setting to 0 (DWORD 0x00000000), indicating that the firewall is being disabled, an alert will be triggered. The rule is focused on the registry paths `\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\EnableFirewall` and `\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\EnableFirewall`. The ability to disable the firewall is a common technique used in cyberattacks to reduce security defenses, making this detection critical for monitoring potential threat activities.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1562.004
Created: 2022-08-19