heroui logo

Windows Disable Windows Event Logging Disable HTTP Logging

Splunk Security Content

View Source
Summary
This detection rule aims to identify potential malicious activity on IIS servers by detecting the use of AppCmd.exe with parameters that disable HTTP logging. It leverages events from endpoint detection and response agents to monitor process execution patterns that deviate from normal behavior. Disabling HTTP logging can impair visibility into a server's activities, allowing attackers to evade detection. The rule is designed to trigger when AppCmd.exe is executed with specific commands that suggest an alteration of logging configurations, thus highlighting potential threat scenarios. The integration with Splunk technology ensures the logs are parsed and correlated effectively to yield actionable insights into suspicious activities.
Categories
  • Windows
  • Endpoint
  • Cloud
  • Infrastructure
Data Sources
  • Windows Registry
  • Logon Session
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1562.002
  • T1562
  • T1505
  • T1505.004
Created: 2024-12-10