
Summary
This analytic rule is designed to detect suspicious modifications to Windows firewall rule registry settings that may allow incoming traffic for specific ports on machines using a public profile. By monitoring changes in the registry, particularly related to the firewall settings indicated by paths such as `\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\`, the rule looks for entries that set the action to allow (`Action=Allow`) and the direction to incoming (`Dir=In`) for any local ports (`LPort=*`). Such modifications may indicate an adversarial action aimed at enabling remote access to compromised systems. The rule sources its data from Sysmon events (EventID 12 and 13), specifically targeting the registry data model from endpoint logs. When modifications are detected, this could represent a significant security threat, potentially leading to unauthorized access, exploitation, or data breaches within the network.
Categories
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Application Log
ATT&CK Techniques
- T1021.001
- T1021
Created: 2024-12-08