Windows Defender Exclusions Added
Detects the Setting of Windows Defender Exclusions
Sigma rule (View on GitHub)
1title: Windows Defender Exclusions Added
2id: 1321dc4e-a1fe-481d-a016-52c45f0c8b4f
3status: stable
4description: Detects the Setting of Windows Defender Exclusions
5references:
6 - https://twitter.com/_nullbind/status/1204923340810543109
7author: Christian Burkard (Nextron Systems)
8date: 2021-07-06
9modified: 2022-12-06
10tags:
11 - attack.defense-evasion
12 - attack.t1562.001
13logsource:
14 product: windows
15 service: windefend
16detection:
17 selection:
18 EventID: 5007 # The antimalware platform configuration changed.
19 NewValue|contains: '\Microsoft\Windows Defender\Exclusions'
20 condition: selection
21falsepositives:
22 - Administrator actions
23level: medium
References
Related rules
- AMSI Bypass Pattern Assembly GetType
- AWS CloudTrail Important Change
- AWS Config Disabling Channel/Recorder
- AWS GuardDuty Important Change
- Add SafeBoot Keys Via Reg Utility