
Summary
The 'Windows AppX Deployment Unsigned Package Installation' detection rule aims to identify attempts to install unsigned MSIX/AppX packages through the Windows Event Logs, specifically leveraging EventID 603 from the AppXDeployment-Server. The rule focuses on tracking installations that utilize the -AllowUnsigned parameter, which corresponds to a specific flag value of 8388608. This flag is a critical indicator since the installation of unsigned packages is often associated with various malicious activities, including the potential execution of arbitrary code and the delivery of malware. By confirming installation attempts marked with this specific flag, security teams can effectively detect and respond to threats where unsigned packages may have been used to bypass security checks typically in place, raising the risk of malware delivery and system compromise. The implementation requires a well-configured event logging environment to track and analyze related events, enabling proactive threat detection in enterprise environments.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1553
- T1553.005
- T1204.002
Created: 2025-08-05