heroui logo

Windows Impair Defense Disable Win Defender Network Protection

Splunk Security Content

View Source
Summary
The rule "Windows Impair Defense Disable Win Defender Network Protection" is designed to monitor and detect modifications to the Windows registry that disable the Windows Defender Network Protection feature. This feature is crucial for analyzing and blocking potentially harmful network activities. The detection leverages Sysmon Event IDs 12 and 13, focusing specifically on changes made to the registry entry that governs Network Protection settings. Disabling this feature can expose systems to network-based threats, thereby heightening the risk of unauthorized access and data breaches. By using the Endpoint.Registry data model to monitor these changes, the rule can effectively flag when the EnableNetworkProtection registry setting is turned off. This analytic thus acts as an alert for potential security compromises and helps maintain endpoint security integrity.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-11-13