
Summary
This detection rule identifies the execution of `auditpol.exe` with the '/set' command-line argument, which is used to modify Windows Audit policies, specifically to disable audit for certain categories or subcategories. Such actions can indicate attempts by attackers (or Red Teams) to evade detection mechanisms, therefore potentially facilitating further attacks without being logged. The rule leverages data from multiple sources, including Sysmon and Windows Event Logs, focusing on specific process behaviors related to the execution of audit policy changes. The effective implementation of this rule requires integration with Endpoint Detection and Response (EDR) tools to gather relevant process execution data alongside command line usage to flag potentially malicious activity. Confirmation of such behavior is critical as it may lead to serious security compromises across the affected systems.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Windows Registry
- Windows Registry
- Image
ATT&CK Techniques
- T1562
- T1562.002
Created: 2025-01-27