heroui logo

Windows Impair Defense Define Win Defender Threat Action

Splunk Security Content

View Source
Summary
This detection rule analyzes changes made to the Windows Defender ThreatSeverityDefaultAction registry setting using Sysmon Event IDs 12 and 13. By monitoring the specified registry paths, the rule identifies alterations to key security configurations that dictate Windows Defender's response to potential threats. Any modifications may weaken system defenses, representing a significant risk as attackers could exploit these changes to bypass antivirus protections. The rule provides actionable alerts if it detects registry entries being modified to values indicating that standard protective actions are disabled, which would allow for persistence of threats and increased data compromise risks. To implement this rule effectively, data associated with process changes must be ingested into the Endpoint datamodel, particularly in the Registry context.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-11-13