heroui logo

Disabling Remote User Account Control

Splunk Security Content

View Source
Summary
This detection rule is focused on identifying modifications to Windows User Account Control (UAC) settings, specifically aimed at changes made to the registry key located at `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA`. Detecting changes to the value of this registry key, particularly when set to `0x00000000`, is critical as such modifications disable UAC functionality. This could enable malicious actors to execute unauthorized actions on a system, bypassing necessary user confirmations and ultimately allowing privilege escalation. The rule captures events logged by Sysmon related to registry changes and highlights potential security violations that may arise from unsafe UAC configurations. Administrators should note that legitimate changes can occur, but they should be infrequent and warrant further investigation if identified.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1548.002
  • T1548
Created: 2024-12-16