
Summary
The rule is designed to detect potential exploitation of a vulnerability in the NTFS file system often referenced in security discussions related to Windows systems. This vulnerability allows attackers to manipulate file records which could lead to corruption and denial of access to certain files or perhaps cause broader system instability. The detection rule focuses on specific Event IDs generated by the NTFS driver when it identifies errors related to corrupted file records. It targets events specifically from the system log where the provider name is 'Ntfs' and seeks occurrences of corruption messages indicating compromised file integrity. The resulting actions log can provide forensic evidence in assessments of breach impact or unauthorized access attempts.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Logon Session
- File
- Process
Created: 2021-01-11