heroui logo

Security Eventlog Cleared

Sigma Rules

View Source
Summary
This detection rule targets the clearing of Windows Event logs, specifically looking for Event ID 517 and Event ID 1102. These events can indicate potential malicious activities such as attempts to hide unauthorized actions by removing traces from the event logs. The rule checks both the Security and Microsoft-Windows-Eventlog providers to ensure thorough coverage. The use of the command 'wevtutil cl' is a known method for clearing logs, which can be a significant indicator of compromise. False positives may occur during legitimate operations such as the rollout of log collection agents or resetting systems prior to provisioning, but these are typically manageable with proper context. The rule was authored by Florian Roth from Nextron Systems and remains relevant as a significant detection mechanism for security monitoring on Windows environments.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
Created: 2017-01-10