
Summary
The TrustedPath UAC Bypass Rule is designed to detect the exploitation of User Account Control (UAC) mechanisms in Windows systems through directory manipulation techniques. This method involves the use of process creation events where the launching executable resides in or is associated with trusted directories, specifically the System32 directory. By monitoring processes that contain paths indicative of such directory hijacking, the rule aims to flag suspicious activities that suggest potential UAC bypass attempts. Given the criticality level of this rule, it should be deployed in environments where enhancements in security controls against privilege escalation and attack defense evasion are paramount.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2021-08-27