
Summary
This rule detects changes made to the Sysmon configuration, specifically targeting Windows Event ID 16, which indicates that the Sysmon configuration has been modified. Such modifications could occur during legitimate administrative activities, but they may also signal unauthorized manipulation as part of an attack to thwart detection mechanisms. The configuration of Sysmon is critical for effective monitoring and logging of system activity, capturing events relevant to security assessments. Consequently, monitoring for any changes to this configuration can provide early warnings of potential compromises.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Application Log
Created: 2022-01-12