heroui logo

Disable Windows Behavior Monitoring

Splunk Security Content

View Source
Summary
This detection rule identifies attempts to disable Windows Defender's real-time behavior monitoring by monitoring specific registry changes using the Endpoint.Registry data model. The rule focuses on several critical registry paths associated with Windows Defender settings, checking for modifications that set values indicating protection is disabled (e.g., setting 'DisableBehaviorMonitoring' to '0x00000001'). This behavior is commonly leveraged by malware (such as Remote Access Trojans and bots) seeking to evade detection by antivirus solutions. By detecting these changes, security teams can quickly respond to potential compromises and further investigate the actions of a compromised endpoint.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • Windows Registry
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-12-08