
Summary
This rule detects the execution of the 'netsh.exe' command with specific options related to the Windows Firewall. It is concerned with the use of 'netsh' when it interacts with the 'advfirewall' subsystem to set properties for existing firewall rules. The detection is triggered if a process creation event shows that 'netsh.exe' was executed with the command line containing both 'firewall' and 'set'. This is particularly useful for identifying attempts to change firewall rules which could indicate malicious intent or unauthorized modifications that may bypass security configurations.
Categories
- Windows
- Network
- Endpoint
Data Sources
- Process
Created: 2023-07-18