Disable Windows IIS HTTP Logging
Disables HTTP logging on a Windows IIS web server as seen by Threat Group 3390 (Bronze Union)
Sigma rule (View on GitHub)
1title: Disable Windows IIS HTTP Logging
2id: e4ed6030-ffe5-4e6a-8a8a-ab3c1ab9d94e
3status: test
4description: Disables HTTP logging on a Windows IIS web server as seen by Threat Group 3390 (Bronze Union)
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.002/T1562.002.md#atomic-test-1---disable-windows-iis-http-logging
7author: frack113
8date: 2022-01-09
9modified: 2023-01-22
10tags:
11 - attack.defense-evasion
12 - attack.t1562.002
13logsource:
14 category: process_creation
15 product: windows
16detection:
17 selection_img:
18 - Image|endswith: '\appcmd.exe'
19 - OriginalFileName: 'appcmd.exe'
20 selection_cli:
21 CommandLine|contains|all:
22 - 'set'
23 - 'config'
24 - 'section:httplogging'
25 - 'dontLog:true'
26 condition: all of selection_*
27falsepositives:
28 - Unknown
29level: high
References
Related rules
- Audit Policy Tampering Via Auditpol
- Audit Policy Tampering Via NT Resource Kit Auditpol
- Change Winevt Channel Access Permission Via Registry
- Disable Windows Event Logging Via Registry
- EVTX Created In Uncommon Location