SigmaHQ/rules/windows/builtin/win_disable_event_logging.yml

26 lines
1.5 KiB
YAML
Raw Normal View History

title: Disabling Windows Event Auditing
2019-11-12 22:12:27 +00:00
id: 69aeb277-f15f-4d2d-b32a-55e883609563
2020-06-16 20:46:08 +00:00
description: 'Detects scenarios where system auditing (ie: windows event log auditing) is disabled. This may be used in a scenario where an entity would want to bypass local logging to evade detection when windows event logging is enabled and reviewed. Also, it is recommended to turn off "Local Group Policy Object Processing" via GPO, which will make sure that Active Directory GPOs take precedence over local/edited computer policies via something such as "gpedit.msc". Please note, that disabling "Local Group Policy Object Processing" may cause an issue in scenarios of one off specific GPO modifications -- however it is recommended to perform these modifications in Active Directory anyways.'
references:
- https://bit.ly/WinLogsZero2Hero
2018-07-24 05:50:32 +00:00
tags:
- attack.defense_evasion
- attack.t1054 # an old one
2020-09-13 13:46:45 +00:00
- attack.t1562.002
author: '@neu5ron'
date: 2017/11/19
logsource:
product: windows
service: security
definition: 'Requirements: Audit Policy : Computer Management > Audit Policy Configuration, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Policy Change\Audit Authorization Policy Change'
detection:
selection:
EventID: 4719
2020-10-09 15:27:04 +00:00
AuditPolicyChanges|contains:
- '%%8448' # This is "Success removed"
- '%%8450' # This is "Failure removed"
condition: selection
falsepositives:
- Unknown
level: high