heroui logo

Windows Audit Policy Auditing Option Disabled via Auditpol

Splunk Security Content

View Source
Summary
The detection rule identifies the execution of the `auditpol.exe` utility with parameters indicating an attempt to disable auditing options in Windows. This is a critical activity because it may signify an effort by adversaries or Red Teams to evade detection mechanisms by limiting the logging of security events. The rule relies on data sourced from Endpoint Detection and Response agents, specifically tracking process executions and their command lines. By focusing on the specific command-line arguments used with `auditpol.exe`, the detection mechanism aims to catch potentially malicious actions designed to compromise logging and monitoring capabilities. Effective implementation of this rule requires proper ingestion and normalization of logs from EDR systems, ensuring that relevant details about process actions are available for analysis. If marked as malicious, this behavior can allow attackers to mask their activity, potentially leading to a full system compromise or lateral movement across the network.
Categories
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1562.002
Created: 2025-01-27