Windows Event Auditing Disabled
Detects scenarios where system auditing (i.e.: Windows event log auditing) is disabled. This may be used in a scenario where an entity would want to bypass local logging to evade detection when Windows event logging is enabled and reviewed. Also, it is recommended to turn off "Local Group Policy Object Processing" via GPO, which will make sure that Active Directory GPOs take precedence over local/edited computer policies via something such as "gpedit.msc". Please note, that disabling "Local Group Policy Object Processing" may cause an issue in scenarios of one off specific GPO modifications - however, it is recommended to perform these modifications in Active Directory anyways.
Sigma rule (View on GitHub)
1title: Windows Event Auditing Disabled
2id: 69aeb277-f15f-4d2d-b32a-55e883609563
3related:
4 - id: ab4561b1-6c7e-48a7-ad08-087cfb9ce8f1
5 type: derived
6status: test
7description: |
8 Detects scenarios where system auditing (i.e.: Windows event log auditing) is disabled.
9 This may be used in a scenario where an entity would want to bypass local logging to evade detection when Windows event logging is enabled and reviewed.
10 Also, it is recommended to turn off "Local Group Policy Object Processing" via GPO, which will make sure that Active Directory GPOs take precedence over local/edited computer policies via something such as "gpedit.msc".
11 Please note, that disabling "Local Group Policy Object Processing" may cause an issue in scenarios of one off specific GPO modifications - however, it is recommended to perform these modifications in Active Directory anyways.
12references:
13 - https://docs.google.com/presentation/d/1dkrldTTlN3La-OjWtkWJBb4hVk6vfsSMBFBERs6R8zA/edit
14author: '@neu5ron, Nasreddine Bencherchali (Nextron Systems)'
15date: 2017-11-19
16modified: 2023-11-15
17tags:
18 - attack.defense-evasion
19 - attack.t1562.002
20logsource:
21 product: windows
22 service: security
23 definition: dfd8c0f4-e6ad-4e07-b91b-f2fca0ddef64
24detection:
25 selection:
26 EventID: 4719
27 AuditPolicyChanges|contains:
28 - '%%8448' # This is "Success removed"
29 - '%%8450' # This is "Failure removed"
30 filter_main_guid:
31 # Note: We filter these GUID to avoid alert duplication as these are covered by ab4561b1-6c7e-48a7-ad08-087cfb9ce8f1
32 SubcategoryGuid:
33 - '{0CCE9210-69AE-11D9-BED3-505054503030}' # Audit Security State Change
34 - '{0CCE9211-69AE-11D9-BED3-505054503030}' # Audit Security System Extension
35 - '{0CCE9212-69AE-11D9-BED3-505054503030}' # Audit System Integrity
36 - '{0CCE9215-69AE-11D9-BED3-505054503030}' # Audit Logon
37 - '{0CCE9217-69AE-11D9-BED3-505054503030}' # Audit Account Lockout
38 - '{0CCE921B-69AE-11D9-BED3-505054503030}' # Audit Special Logon
39 - '{0CCE922B-69AE-11D9-BED3-505054503030}' # Audit Process Creation
40 - '{0CCE922F-69AE-11D9-BED3-505054503030}' # Audit Audit Policy Change
41 - '{0CCE9230-69AE-11D9-BED3-505054503030}' # Audit Authentication Policy Change
42 - '{0CCE9235-69AE-11D9-BED3-505054503030}' # Audit User Account Management
43 - '{0CCE9236-69AE-11D9-BED3-505054503030}' # Audit Computer Account Management
44 - '{0CCE9237-69AE-11D9-BED3-505054503030}' # Audit Security Group Management
45 - '{0CCE923F-69AE-11D9-BED3-505054503030}' # Audit Credential Validation
46 - '{0CCE9240-69AE-11D9-BED3-505054503030}' # Audit Kerberos Service Ticket Operations
47 - '{0CCE9242-69AE-11D9-BED3-505054503030}' # Audit Kerberos Authentication Service'
48 condition: selection and not 1 of filter_main_*
49falsepositives:
50 - Unknown
51level: low # Increase this after a testing period in your environment
References
Related rules
- Audit Policy Tampering Via Auditpol
- Audit Policy Tampering Via NT Resource Kit Auditpol
- Change Winevt Channel Access Permission Via Registry
- Disable Windows Event Logging Via Registry
- Disable Windows IIS HTTP Logging