
Summary
This detection rule aims to monitor and identify changes to the configuration of Internet Information Services (IIS) servers that result in disabling or removing the Event Tracing for Windows (ETW) logging or processing options. ETW logging is crucial for capturing detailed event data for web activity, and its absence could indicate attempts to evade detection by attackers. The rule specifically tracks Event ID 29, which pertains to the IIS configuration changes, confirming if the logging has been set to '@logTargetW3C' while also checking if the previous configuration contained 'ETW'. If these conditions are met, and there isn't a subsequent logging addition of 'ETW', this triggers an alert, indicating a potential security incident where logging mechanisms are intentionally disabled.
Categories
- Windows
- Cloud
- On-Premise
- Web
Data Sources
- Logon Session
- Application Log
- Windows Registry
- Process
Created: 2024-10-06