
Summary
The Windows AppLocker Block Events analytic is designed to detect attempts to circumvent application control policies on Windows systems by monitoring AppLocker-generated event logs. It specifically targets event codes that indicate when the AppLocker has blocked applications, thus revealing potential malicious activity aimed at executing unauthorized software. This analytic takes advantage of Windows event log entries corresponding to various blocked actions, offering insights into whether the events stem from legitimate administrative actions or malicious attempts to bypass AppLocker controls. The detection relies on Splunk to collect and analyze these event logs, allowing security teams to respond effectively to possible threats, such as unauthorized application executions that could lead to security breaches or data loss. It is essential for security operations centers (SOC) to monitor and investigate these violations, as they could warn of deeper infiltrations within an environment.
Categories
- Endpoint
Data Sources
- Windows Registry
- Application Log
ATT&CK Techniques
- T1218
- T1562
Created: 2024-11-13