
Summary
This detection rule focuses on identifying potential abuses of Windows Defender's Attack Surface Reduction (ASR) capabilities. It specifically monitors for commands that alter or disable ASR rules via command-line executions of 'Add-MpPreference' or 'Set-MpPreference', which are often leveraged by attackers to evade detection from antivirus solutions. The threat is significant as it may allow malicious code to run without interference. Implementing this rule requires data from EDR agents to detect such command executions, with the main sources being Sysmon and Windows Event Logs. Any flagged behavior should be investigated, as legitimate administrative actions may also trigger alerts, requiring filtering of known false positives. The rule is aligned with the MITRE ATT&CK tactic for defense evasion (T1562.001).
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- User Account
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1562.001
Created: 2025-10-13