heroui logo

Audit Policy Tampering Via Auditpol

Sigma Rules

View Source
Summary
This detection rule aims to identify potentially malicious actions taken by threat actors who may use the 'auditpol' binary to alter audit policy settings on Windows systems. By manipulating audit policies, attackers can suppress logs and evade detection mechanisms, making it difficult for security teams to track their activities. The rule monitors process creation events specifically involving the 'auditpol' executable and looks for command line arguments that suggest attempts to disable, clear, remove, or restore audit policies. If any of these actions are detected, it raises an alert due to their high potential to impair security monitoring capabilities. The rule is targeted towards enhancing visibility into changes that could be indicative of a breach, particularly actions related to the management of audit policies that could assist in nefarious operations.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2021-02-02