heroui logo

Powershell Windows Defender Exclusion Commands

Splunk Security Content

View Source
Summary
This analytic rule detects the use of PowerShell commands that interact with Windows Defender settings, specifically focusing on commands that add or set exclusions. The detection utilizes Event Code 4104, which logs PowerShell script block execution, and filters for both the `Add-MpPreference` and `Set-MpPreference` commands containing exclusion parameters. This detection is critical because malicious actors often manipulate these settings to bypass security measures, thereby allowing harmful software to operate undetected. If the detected activity is confirmed as malicious, it could indicate an attempt to maintain persistence or execute further attacks without alerting security measures.
Categories
  • Windows
  • Endpoint
Data Sources
  • Pod
  • Process
  • Application Log
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-11-13