heroui logo

Windows Defender Exclusion Deleted

Sigma Rules

View Source
Summary
This detection rule is designed to identify when a Windows Defender exclusion has been deleted from the system. The deletion of exclusions may signify malicious activity, as attackers could seek to erase their tracks, especially after making unauthorized changes to system configurations that allow malware to bypass security measures. The rule monitors security event logs for Event ID 4660, which corresponds to object deletion, specifically looking for entries indicating paths under the Windows Defender exclusions folder. This behavior is relevant in the context of maintaining system integrity and ensuring that security mechanisms remain intact. The presence of the event in logs may warrant further investigation to determine whether the deletion was a legitimate administrative action or a potentially harmful maneuver by an intruder. As this rule is set to 'test' status, it may still be in the validation phase to ascertain its efficacy in real-world scenarios. Additionally, the use of Windows Security auditing policies and registry SACL helps provide a robust mechanism for detecting these potentially evasive actions.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
  • Process
Created: 2019-10-26