heroui logo

Microsoft Windows Defender Tampering

Elastic Detection Rules

View Source
Summary
This rule detects when features of Microsoft Defender are disabled, which could indicate malicious activity aimed at evading detection mechanisms. The rule analyses specific registry changes that correspond to the disabling of critical security features on Windows systems. Notably, it tracks the state of various registry keys tied to Microsoft Defender's functionality. Disabling these features can allow adversaries greater freedom to execute malicious operations without being detected. The analysis includes monitoring for processes that change these registry settings, ensuring that any modifications are not performed by unexpected executables. The rule provides a framework for investigating such alterations, emphasizing cross-verification with user activities and legitimate administrative tasks. If the alert triggers, it suggests proceeding with incident response protocols and reviewing host isolation strategies as necessary components of the response strategy. The rule is tagged with various use-case identifiers indicating its relevance to threat detection, defense evasion, and endpoint protection, among other domains.
Categories
  • Endpoint
  • Windows
  • Cloud
Data Sources
  • Windows Registry
  • Malware Repository
  • Application Log
  • Process
  • Network Share
  • Sensor Health
ATT&CK Techniques
  • T1112
  • T1562
Created: 2021-10-18