heroui logo

Windows Modify Registry DisableSecuritySettings

Splunk Security Content

View Source
Summary
The rule "Windows Modify Registry DisableSecuritySettings" targets modifications in the Windows registry that disable security settings associated with Terminal Services. By leveraging Sysmon Event IDs 12 and 13, this analytic specifically monitors changes within the registry path for Terminal Services, detecting when the value for 'DisableSecuritySettings' is set to '1'. Such changes are critical to monitor because tampering with these security settings can significantly weaken the security posture of Remote Desktop Services, exposing the system to potential unauthorized remote access. The impact of confirming such activity may lead to persistent unauthorized access, further exploitation, or data exfiltration. The rule integrates with the Endpoint data model and requires appropriate logging configuration to effectively capture relevant registry modifications.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1112
Created: 2024-11-13