
New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application
Sigma Rules
View SourceSummary
This detection rule identifies the addition of a new rule to the Windows Firewall exception list, specifically for applications located in directories that may be deemed suspicious. The primary method involves monitoring event IDs associated with firewall changes while applying conditions to check for paths that are commonly associated with temporary files or potential malicious activities. By focusing on applications that are executed from directories like `Temp`, `AppData`, and `PerfLogs`, the detection aims to mitigate risks posed by unauthorized or malicious applications attempting to bypass firewall protections. The rule utilizes EventID values (2004, 2071, 2097) to capture relevant events and employs filtering that ensures it only triggers if the action is an addition of a rule (Action: 2). Determining the legitimacy of these applications is critical, as they might indicate firewall evasion tactics used by attackers.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Firewall
Created: 2023-02-26