heroui logo

Disable Defender AntiVirus Registry

Splunk Security Content

View Source
Summary
The detection rule titled 'Disable Defender AntiVirus Registry' is designed to monitor and identify modifications made to Windows Defender registry settings, particularly when these changes disable antivirus and antispyware protections. This rule specifically leverages data from the Endpoint.Registry data model, targeting registry paths related to Windows Defender's policies. These modifications are crucial indicators of potentially malicious activity, as adversaries often disable antivirus defenses to evade detection and maintain persistence on compromised systems. The rule tracks changes to values named 'DisableAntiSpyware' and 'DisableAntiVirus', specifically looking for alterations where the value is set to '1'. If successful, this detection can alert security teams to early signs of compromise, allowing for quicker remediation and protecting against further malicious actions that could lead to data breaches or malware proliferation across the network. Implementation requires capturing relevant logs from endpoints via Sysmon, and potential false positives may arise during legitimate administrative tasks.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-12-08