
Summary
This rule is designed to detect potentially malicious requests to create exclusions for files, folders, or processes from scanning by Microsoft Defender Antivirus via PowerShell. The detections focus specifically on PowerShell commands that add preferences for exclusions, such as 'Add-MpPreference' and 'Set-MpPreference'. By examining the command line arguments for specific exclusion parameters like 'ExclusionPath', 'ExclusionExtension', 'ExclusionProcess', and 'ExclusionIpAddress', the rule can identify potential misuse of administrative commands that are intended to circumvent antivirus protections. The detection combines multiple selections ensuring that command invocations must meet all criteria to trigger an alert, which helps reduce false positives from legitimate administrative activities.
Categories
- Endpoint
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1562.001
Created: 2021-04-29