
Summary
This rule monitors for modifications to the Windows Defender default threat action settings, specifically targeting the severity configurations that dictate whether threats are allowed or not mitigated. A change in this setting to values that effectively permit the execution of malware (such as 'allow' or 'no action') is particularly concerning, as it undermines the defense mechanisms of Windows Defender. Attackers may exploit this vulnerability by adjusting these settings to run malicious software without interference. The detection focuses on alterations involving specific registry paths and values indicative of such changes.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2025-07-11