
Summary
The analytic rule "Disable Defender Enhanced Notification" is designed to detect changes to the Windows Registry that disable the Enhanced Notification feature of Windows Defender. This is achieved by monitoring specific Sysmon event IDs associated with process activity and registry modifications. The modification of this registry setting is critical because it can obscure security alerts that Windows Defender would normally provide, potentially allowing malicious behavior to persist unnoticed. The detection mechanism relies on data collected from Endpoint Detection and Response (EDR) agents, specifically looking for registry changes at the path associated with Windows Defender reporting. If such a change is detected and verified as being malicious, it indicates a potential security breach where an attacker may be attempting to evade detection and escalate their access to the system without triggering alerts. The rule’s search query efficiently consolidates relevant data, leveraging the capabilities of the Splunk platform to correlate process and registry event logs. Implementing this detection requires careful integration of Sysmon logs, ensuring that they align with the Endpoint data model for effective monitoring and alerting.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Windows Registry
ATT&CK Techniques
- T1562.001
- T1562
Created: 2025-01-21