
Summary
The detection rule 'RestrictedAdminMode Registry Value Tampering - ProcCreation' is designed to monitor changes to the Windows Registry value named 'DisableRestrictedAdmin'. This registry key controls access to the Remote Desktop Services' Restricted Admin Mode, intended to mitigate the risk of credential theft during remote desktop connections. When enforced, Restricted Admin Mode prevents the transmission of reusable credentials, safeguarding the user's information if connecting to a potentially compromised remote server. The rule specifically looks for process creation events where the command line includes the path to the registry key indicating an attempt to modify this setting. Given that altering this value can directly affect security posture, any detected modifications trigger an alert, thus supporting incident response teams in identifying potential circumvention of security protocols.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1112
Created: 2023-01-13