heroui logo

Tamper Windows Defender Remove-MpPreference

Sigma Rules

View Source
Summary
This rule aims to identify and alert on attempts to tamper with Windows Defender configurations on Windows machines, specifically through the use of the 'Remove-MpPreference' cmdlet in PowerShell. This cmdlet is commonly used to modify or disable certain security features within Windows Defender, which can be indicative of an attacker attempting to disable protective measures to facilitate further malicious activities. The detection logic scrutinizes the command line for instances of 'Remove-MpPreference' and variations related to specific sensitive configurations such as Controlled Folder Access and Attack Surface Reduction rules. By enforcing strict conditions on PowerShell command line arguments, the rule effectively reduces false positives from legitimate uses of PowerShell, particularly by monitoring for potential environment tampering. Given the serious implications of removing security configurations, this rule is classified with a high severity level and serves as a proactive measure to maintain endpoint security and integrity.
Categories
  • Endpoint
  • Windows
  • Infrastructure
Data Sources
  • Process
Created: 2022-08-05