SigmaHQ/rules/windows/other/win_defender_history_delete.yml
2021-07-01 12:18:30 +05:45

27 lines
909 B
YAML

title: Windows Defender Malware Detection History Deletion
id: 2afe6582-e149-11ea-87d0-0242ac130003
status: experimental
description: Windows Defender logs when the history of detected infections is deleted. Log file will contain the message "Windows Defender Antivirus has removed history of malware and other potentially unwanted software".
author: Cian Heasley
references:
- https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus
date: 2020/08/13
modified: 2021/05/30
tags:
- attack.defense_evasion
- attack.t1070.001
logsource:
product: windows
service: windefend
detection:
selection:
EventID: 1013
EventType: 4
condition: selection
fields:
- EventID
- EventType
falsepositives:
- Deletion of Defender malware detections history for legitimate reasons
level: high