<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>attack.defense-impairment on Detection.FYI</title>
    <link>https://detection.fyi/tags/attack.defense-impairment/</link>
    <description>Recent content in attack.defense-impairment on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Tue, 28 Apr 2026 23:20:23 +0000</lastBuildDate><atom:link href="https://detection.fyi/tags/attack.defense-impairment/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>A Rule Has Been Deleted From The Windows Firewall Exception List</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_delete_rule/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_delete_rule/</guid>
      <description>
        
          
            Detects when a single rules or all of the rules have been deleted from the Windows Defender Firewall
          
          
        
      </description>
    </item>
    
    <item>
      <title>Activate Suppression of Windows Security Center Notifications</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_suppress_defender_notifications/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_suppress_defender_notifications/</guid>
      <description>
        
          
            Detect set Notification_Suppress to 1 to disable the Windows security center notification
          
          
        
      </description>
    </item>
    
    <item>
      <title>Active Directory Certificate Services Denied Certificate Enrollment Request</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_certification_authority/win_system_adcs_enrollment_request_denied/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_certification_authority/win_system_adcs_enrollment_request_denied/</guid>
      <description>
        
          
            Detects denied requests by Active Directory Certificate Services.
Example of these requests denial include issues with permissions on the certificate template or invalid signatures.

          
          
        
      </description>
    </item>
    
    <item>
      <title>AD Object WriteDAC Access</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_ad_object_writedac_access/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_ad_object_writedac_access/</guid>
      <description>
        
          
            Detects WRITE_DAC access to a domain object
          
          
        
      </description>
    </item>
    
    <item>
      <title>Add DisallowRun Execution to Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disallowrun_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disallowrun_execution/</guid>
      <description>
        
          
            Detect set DisallowRun to 1 to prevent user running specific computer program
          
          
        
      </description>
    </item>
    
    <item>
      <title>Add or Remove Computer from DC</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_add_remove_computer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_add_remove_computer/</guid>
      <description>
        
          
            Detects the creation or removal of a computer. Can be used to detect attacks such as DCShadow via the creation of a new SPN.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Add SafeBoot Keys Via Reg Utility</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_add_safeboot/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_add_safeboot/</guid>
      <description>
        
          
            Detects execution of &#34;reg.exe&#34; commands with the &#34;add&#34; or &#34;copy&#34; flags on safe boot registry keys. Often used by attacker to allow the ransomware to work in safe mode as some security products do not
          
          
        
      </description>
    </item>
    
    <item>
      <title>All Rules Have Been Deleted From The Windows Firewall Configuration</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_delete_all_rules/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_delete_all_rules/</guid>
      <description>
        
          
            Detects when a all the rules have been deleted from the Windows Defender Firewall configuration
          
          
        
      </description>
    </item>
    
    <item>
      <title>Allow RDP Remote Assistance Feature</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_allow_rdp_remote_assistance_feature/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_allow_rdp_remote_assistance_feature/</guid>
      <description>
        
          
            Detect enable rdp feature to allow specific user to rdp connect on the targeted machine
          
          
        
      </description>
    </item>
    
    <item>
      <title>AMSI Bypass Pattern Assembly GetType</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_amsi_bypass_pattern_nov22/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_amsi_bypass_pattern_nov22/</guid>
      <description>
        
          
            Detects code fragments found in small and obfuscated AMSI bypass PowerShell scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>AMSI Disabled via Registry Modification</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_amsi_disable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_amsi_disable/</guid>
      <description>
        
          
            Detects attempts to disable AMSI (Anti-Malware Scan Interface) by modifying the AmsiEnable registry value.
Anti-Malware Scan Interface (AMSI) is a security feature in Windows that allows applications and services to integrate with anti-malware products for enhanced protection against malicious content.
Adversaries may attempt to disable AMSI to evade detection by security software, allowing them to execute malicious scripts or code without being scanned.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Amsi.DLL Loaded Via LOLBIN Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_amsi_suspicious_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_amsi_suspicious_process/</guid>
      <description>
        
          
            Detects loading of &#34;Amsi.dll&#34; by a living of the land process. This could be an indication of a &#34;PowerShell without PowerShell&#34; attack
          
          
        
      </description>
    </item>
    
    <item>
      <title>Antivirus Filter Driver Disallowed On Dev Drive - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_devdrv_disallow_antivirus_filter/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_devdrv_disallow_antivirus_filter/</guid>
      <description>
        
          
            Detects activity that indicates a user disabling the ability for Antivirus mini filter to inspect a &#34;Dev Drive&#34;.

          
          
        
      </description>
    </item>
    
    <item>
      <title>ASLR Disabled Via Sysctl or Direct Syscall - Linux</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/lnx_auditd_disable_aslr_protection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/lnx_auditd_disable_aslr_protection/</guid>
      <description>
        
          
            Detects actions that disable Address Space Layout Randomization (ASLR) in Linux, including:
  - Use of the `personality` syscall with the ADDR_NO_RANDOMIZE flag (0x0040000)
  - Modification of the /proc/sys/kernel/randomize_va_space file
  - Execution of the `sysctl` command to set `kernel.randomize_va_space=0`
Disabling ASLR is often used by attackers during exploit development or to bypass memory protection mechanisms.
A successful use of these methods can reduce the effectiveness of ASLR and make memory corruption attacks more reliable.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Audit Policy Tampering Via Auditpol</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_auditpol_susp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_auditpol_susp_execution/</guid>
      <description>
        
          
            Threat actors can use auditpol binary to change audit policy configuration to impair detection capability.
This can be carried out by selectively disabling/removing certain audit policies as well as restoring a custom policy owned by the threat actor.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Audit Policy Tampering Via NT Resource Kit Auditpol</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_auditpol_nt_resource_kit_usage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_auditpol_nt_resource_kit_usage/</guid>
      <description>
        
          
            Threat actors can use an older version of the auditpol binary available inside the NT resource kit to change audit policy configuration to impair detection capability.
This can be carried out by selectively disabling/removing certain audit policies as well as restoring a custom policy owned by the threat actor.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Audit Rules Deleted Via Auditctl</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_auditctl_clear_rules/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_auditctl_clear_rules/</guid>
      <description>
        
          
            Detects the execution of &#39;auditctl&#39; with the &#39;-D&#39; command line parameter, which deletes all configured audit rules and watches on Linux systems.
This technique is commonly used by attackers to disable audit logging and cover their tracks by removing monitoring capabilities.
Removal of audit rules can significantly impair detection of malicious activities on the affected system.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Auditing Configuration Changes on Linux Host</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/path/lnx_auditd_auditing_config_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/path/lnx_auditd_auditing_config_change/</guid>
      <description>
        
          
            Detect changes in auditd configuration files
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS CloudTrail Important Change</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_disable_logging/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_disable_logging/</guid>
      <description>
        
          
            Detects disabling, deleting and updating of a Trail
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS Config Disabling Channel/Recorder</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_config_disable_recording/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_config_disable_recording/</guid>
      <description>
        
          
            Detects AWS Config Service disabling
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS GuardDuty Detector Deleted Or Updated</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_guardduty_detector_deleted_or_updated/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_guardduty_detector_deleted_or_updated/</guid>
      <description>
        
          
            Detects successful deletion or disabling of an AWS GuardDuty detector, possibly by an attacker trying to avoid detection of its malicious activities.
Upon deletion, GuardDuty stops monitoring the environment and all existing findings are lost.
Verify with the user identity that this activity is legitimate.

          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS GuardDuty Important Change</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_guardduty_disruption/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_guardduty_disruption/</guid>
      <description>
        
          
            Detects updates of the GuardDuty list of trusted IPs, perhaps to disable security alerts against malicious IPs.
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS Identity Center Identity Provider Change</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_sso_idp_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_sso_idp_change/</guid>
      <description>
        
          
            Detects a change in the AWS Identity Center (FKA AWS SSO) identity provider.
A change in identity provider allows an attacker to establish persistent access or escalate privileges via user impersonation.

          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS SecurityHub Findings Evasion</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_securityhub_finding_evasion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_securityhub_finding_evasion/</guid>
      <description>
        
          
            Detects the modification of the findings on SecurityHub.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Active Directory Hybrid Health AD FS New Server</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_aadhybridhealth_adfs_new_server/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_aadhybridhealth_adfs_new_server/</guid>
      <description>
        
          
            This detection uses azureactivity logs (Administrative category) to identify the creation or update of a server instance in an Azure AD Hybrid health AD FS service.
A threat actor can create a new AD Health ADFS service and create a fake server instance to spoof AD FS signing logs. There is no need to compromise an on-prem AD FS server.
This can be done programmatically via HTTP requests to Azure.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Active Directory Hybrid Health AD FS Service Delete</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_aadhybridhealth_adfs_service_delete/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_aadhybridhealth_adfs_service_delete/</guid>
      <description>
        
          
            This detection uses azureactivity logs (Administrative category) to identify the deletion of an Azure AD Hybrid health AD FS service instance in a tenant.
A threat actor can create a new AD Health ADFS service and create a fake server to spoof AD FS signing logs.
The health AD FS service can then be deleted after it is not longer needed via HTTP requests to Azure.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure AD Only Single Factor Authentication Required</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_only_single_factor_auth_required/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_only_single_factor_auth_required/</guid>
      <description>
        
          
            Detect when users are authenticating without MFA being required.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Firewall Modified or Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_firewall_modified_or_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_firewall_modified_or_deleted/</guid>
      <description>
        
          
            Identifies when a firewall is created, modified, or deleted.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Firewall Rule Collection Modified or Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_firewall_rule_collection_modified_or_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_firewall_rule_collection_modified_or_deleted/</guid>
      <description>
        
          
            Identifies when Rule Collections (Application, NAT, and Network) is being modified or deleted.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Kubernetes Events Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_kubernetes_events_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_kubernetes_events_deleted/</guid>
      <description>
        
          
            Detects when Events are deleted in Azure Kubernetes. An adversary may delete events in Azure Kubernetes in an attempt to evade detection.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Network Firewall Policy Modified or Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_network_firewall_policy_modified_or_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_network_firewall_policy_modified_or_deleted/</guid>
      <description>
        
          
            Identifies when a Firewall Policy is Modified or Deleted.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket Audit Log Configuration Updated</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_log_configuration_update_detected/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_log_configuration_update_detected/</guid>
      <description>
        
          
            Detects changes to the bitbucket audit log configuration.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket Global Secret Scanning Rule Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_global_secret_scanning_rule_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_global_secret_scanning_rule_deleted/</guid>
      <description>
        
          
            Detects Bitbucket global secret scanning rule deletion activity.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket Global SSH Settings Changed</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_global_ssh_settings_change_detected/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_global_ssh_settings_change_detected/</guid>
      <description>
        
          
            Detects Bitbucket global SSH access configuration changes.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket Project Secret Scanning Allowlist Added</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_project_secret_scanning_allowlist_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_project_secret_scanning_allowlist_added/</guid>
      <description>
        
          
            Detects when a secret scanning allowlist rule is added for projects.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket Secret Scanning Exempt Repository Added</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_secret_scanning_exempt_repository_detected/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_secret_scanning_exempt_repository_detected/</guid>
      <description>
        
          
            Detects when a repository is exempted from secret scanning feature.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket Secret Scanning Rule Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_secret_scanning_rule_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_secret_scanning_rule_deleted/</guid>
      <description>
        
          
            Detects when secret scanning rule is deleted for the project or repository.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Blackbyte Ransomware Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/blackbyte/registry_set_win_malware_blackbyte_privesc_registry/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/blackbyte/registry_set_win_malware_blackbyte_privesc_registry/</guid>
      <description>
        
          
            Detects specific windows registry modifications made by BlackByte ransomware variants.
BlackByte set three different registry values to escalate privileges and begin setting the stage for lateral movement and encryption.
This rule triggers when any of the following registry keys are set to DWORD 1, however all three should be investigated as part of a larger BlackByte ransomware detection and response effort.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Blue Mockingbird</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/blue-mockingbird/proc_creation_win_malware_blue_mockingbird/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/blue-mockingbird/proc_creation_win_malware_blue_mockingbird/</guid>
      <description>
        
          
            Attempts to detect system changes made by Blue Mockingbird
          
          
        
      </description>
    </item>
    
    <item>
      <title>Blue Mockingbird - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/blue-mockingbird/registry_set_mal_blue_mockingbird/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/blue-mockingbird/registry_set_mal_blue_mockingbird/</guid>
      <description>
        
          
            Attempts to detect system changes made by Blue Mockingbird
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bpfdoor TCP Ports Redirect</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_bpfdoor_port_redirect/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_bpfdoor_port_redirect/</guid>
      <description>
        
          
            All TCP traffic on particular port from attacker is routed to different port. ex. &#39;/sbin/iptables -t nat -D PREROUTING -p tcp -s 192.168.1.1 --dport 22 -j REDIRECT --to-ports 42392&#39;
The traffic looks like encrypted SSH communications going to TCP port 22, but in reality is being directed to the shell port once it hits the iptables rule for the attacker host only.

          
          
        
      </description>
    </item>
    
    <item>
      <title>CA Policy Removed by Non Approved Actor</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_aad_secops_ca_policy_removedby_bad_actor/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_aad_secops_ca_policy_removedby_bad_actor/</guid>
      <description>
        
          
            Monitor and alert on conditional access changes where non approved actor removed CA Policy.
          
          
        
      </description>
    </item>
    
    <item>
      <title>CA Policy Updated by Non Approved Actor</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_aad_secops_ca_policy_updatedby_bad_actor/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_aad_secops_ca_policy_updatedby_bad_actor/</guid>
      <description>
        
          
            Monitor and alert on conditional access changes. Is Initiated by (actor) approved to make changes? Review Modified Properties and compare &#34;old&#34; vs &#34;new&#34; value.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Certificate-Based Authentication Enabled</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_certificate_based_authencation_enabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_certificate_based_authencation_enabled/</guid>
      <description>
        
          
            Detects when certificate based authentication has been enabled in an Azure Active Directory tenant.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Change the Fax Dll</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_fax_dll_persistance/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_fax_dll_persistance/</guid>
      <description>
        
          
            Detect possible persistence using Fax DLL load when service restart
          
          
        
      </description>
    </item>
    
    <item>
      <title>Change to Authentication Method</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_change_to_authentication_method/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_change_to_authentication_method/</guid>
      <description>
        
          
            Change to authentication method could be an indicator of an attacker adding an auth method to the account so they can have continued access.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Change User Account Associated with the FAX Service</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_fax_change_service_user/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_fax_change_service_user/</guid>
      <description>
        
          
            Detect change of the user account associated with the FAX service to avoid the escalation problem.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Change Winevt Channel Access Permission Via Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_change_winevt_channelaccess/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_change_winevt_channelaccess/</guid>
      <description>
        
          
            Detects tampering with the &#34;ChannelAccess&#34; registry key in order to change access to Windows event channel.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Changes to Device Registration Policy</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_device_registration_policy_changes/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_device_registration_policy_changes/</guid>
      <description>
        
          
            Monitor and alert for changes to the device registration policy.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Chmod Targeting Sensitive Directories</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_chmod_targeting_sensitive_directories/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_chmod_targeting_sensitive_directories/</guid>
      <description>
        
          
            Detects chmod targeting files in sensitive directory paths on Linux systems.
Attackers may use chmod to change permissions of files in these directories to maintain persistence, escalate privileges, or disrupt system operations.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Cisco Crypto Commands</title>
      <link>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_crypto_actions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_crypto_actions/</guid>
      <description>
        
          
            Show when private keys are being exported from the device, or when new certificates are installed
          
          
        
      </description>
    </item>
    
    <item>
      <title>Cisco Disabling Logging</title>
      <link>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_disable_logging/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_disable_logging/</guid>
      <description>
        
          
            Turn off logging locally or remote
          
          
        
      </description>
    </item>
    
    <item>
      <title>Cisco Dot1x Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_dot1x_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_dot1x_disabled/</guid>
      <description>
        
          
            Detects the manual disablement of IEEE 802.1X (dot1x) on a Cisco network device interface.
Disabling dot1x bypasses Network Access Control (NAC) mechanisms, potentially allowing unauthorized devices to gain access to the internal network.
This activity is a common technique used by attackers or malicious insiders to establish persistence or perform lateral movement via rogue devices.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Clear or Disable Kernel Ring Buffer Logs via Syslog Syscall</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/syscall/lnx_auditd_clean_disable_dmesg_logs_via_syslog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/syscall/lnx_auditd_clean_disable_dmesg_logs_via_syslog/</guid>
      <description>
        
          
            Detects the use of the `syslog` syscall with action code 5 (SYSLOG_ACTION_CLEAR),
(4 is SYSLOG_ACTION_READ_CLEAR and 6 is SYSLOG_ACTION_CONSOLE_OFF) which clears the kernel
ring buffer (dmesg logs). This can be used by attackers to hide traces after exploitation
or privilege escalation. A common technique is running `dmesg -c`, which triggers this syscall internally.

          
          
        
      </description>
    </item>
    
    <item>
      <title>ClickOnce Trust Prompt Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_clickonce_trust_prompt/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_clickonce_trust_prompt/</guid>
      <description>
        
          
            Detects changes to the ClickOnce trust prompt registry key in order to enable an installation from different locations such as the Internet.
          
          
        
      </description>
    </item>
    
    <item>
      <title>CrashControl CrashDump Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_crashdump_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_crashdump_disabled/</guid>
      <description>
        
          
            Detects disabling the CrashDump per registry (as used by HermeticWiper)
          
          
        
      </description>
    </item>
    
    <item>
      <title>CVE-2020-1048 Exploitation Attempt - Suspicious New Printer Ports - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/exploits/cve-2020-1048/registry_set_exploit_cve_2020_1048_new_printer_port/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/exploits/cve-2020-1048/registry_set_exploit_cve_2020_1048_new_printer_port/</guid>
      <description>
        
          
            Detects changes to the &#34;Ports&#34; registry key with data that includes a Windows path or a file with a suspicious extension.
This could be an attempt to exploit CVE-2020-1048 - a Windows Print Spooler elevation of privilege vulnerability.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Delete Defender Scan ShellEx Context Menu Registry Key</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_defender_context_menu/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_defender_context_menu/</guid>
      <description>
        
          
            Detects deletion of registry key that adds &#39;Scan with Defender&#39; option in context menu. Attackers may use this to make it harder for users to scan files that are suspicious.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Deployment Of The AppX Package Was Blocked By The Policy</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_policy_block/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_policy_block/</guid>
      <description>
        
          
            Detects an appx package deployment that was blocked by the local computer policy.
The following events indicate that an AppX package deployment was blocked by a policy:
- Event ID 441: The package deployment operation is blocked by the &#34;Allow deployment operations in special profiles&#34; policy
- Event ID 442: Deployments to non-system volumes are blocked by the &#34;Disable deployment of Windows Store apps to non-system volumes&#34; policy.&#34;
- Event ID 453: Package blocked by a platform policy.
- Event ID 454: Package blocked by a platform policy.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Devcon Execution Disabling VMware VMCI Device</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_devcon_disable_vmci_driver/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_devcon_disable_vmci_driver/</guid>
      <description>
        
          
            Detects execution of devcon.exe with commands that disable the VMware Virtual Machine Communication Interface (VMCI) device.
This can be legitimate during VMware Tools troubleshooting or driver conflicts, but may also indicate malware attempting to hijack communication with the hardware via the VMCI device.
This has been used to facilitate VMware ESXi vulnerability exploits to escape VMs and execute code on the ESXi host.

          
          
        
      </description>
    </item>
    
    <item>
      <title>DHCP Callout DLL Installation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dhcp_calloutdll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dhcp_calloutdll/</guid>
      <description>
        
          
            Detects the installation of a Callout DLL via CalloutDlls and CalloutEnabled parameter in Registry, which can be used to execute code in context of the DHCP server (restart required)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Diamond Sleet APT Scheduled Task Creation - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/diamond-sleet/registry_event_apt_diamond_sleet_scheduled_task/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/diamond-sleet/registry_event_apt_diamond_sleet_scheduled_task/</guid>
      <description>
        
          
            Detects registry event related to the creation of a scheduled task used by Diamond Sleet APT during exploitation of Team City CVE-2023-42793 vulnerability

          
          
        
      </description>
    </item>
    
    <item>
      <title>Directory Service Restore Mode(DSRM) Registry Value Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dsrm_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dsrm_tampering/</guid>
      <description>
        
          
            Detects changes to &#34;DsrmAdminLogonBehavior&#34; registry value.
During a Domain Controller (DC) promotion, administrators create a Directory Services Restore Mode (DSRM) local administrator account with a password that rarely changes. The DSRM account is an “Administrator” account that logs in with the DSRM mode when the server is booting up to restore AD backups or recover the server from a failure.
Attackers could abuse DSRM account to maintain their persistence and access to the organization&#39;s Active Directory.
If the &#34;DsrmAdminLogonBehavior&#34; value is set to &#34;0&#34;, the administrator account can only be used if the DC starts in DSRM.
If the &#34;DsrmAdminLogonBehavior&#34; value is set to &#34;1&#34;, the administrator account can only be used if the local AD DS service is stopped.
If the &#34;DsrmAdminLogonBehavior&#34; value is set to &#34;2&#34;, the administrator account can always be used.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Exploit Guard Network Protection on Windows Defender</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_exploit_guard_net_protection_on_ms_defender/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_exploit_guard_net_protection_on_ms_defender/</guid>
      <description>
        
          
            Detects disabling Windows Defender Exploit Guard Network Protection
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Internal Tools or Feature in Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_function_user/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_function_user/</guid>
      <description>
        
          
            Detects registry modifications that change features of internal Windows tools (malware like Agent Tesla uses this technique)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Macro Runtime Scan Scope</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_macroruntimescanscope/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_macroruntimescanscope/</guid>
      <description>
        
          
            Detects tampering with the MacroRuntimeScanScope registry key to disable runtime scanning of enabled macros
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Microsoft Defender Firewall via Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_defender_firewall/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_defender_firewall/</guid>
      <description>
        
          
            Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable of ETW Trace - Powershell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_etw_trace_evasion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_etw_trace_evasion/</guid>
      <description>
        
          
            Detects usage of powershell cmdlets to disable or remove ETW trace sessions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Or Stop Services</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_services_stop_and_disable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_services_stop_and_disable/</guid>
      <description>
        
          
            Detects the usage of utilities such as &#39;systemctl&#39;, &#39;service&#39;...etc to stop or disable tools and services on Linux systems.
Attackers may stop or disable security tools and services to evade detection, maintain persistence, or disrupt system operations.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Privacy Settings Experience in Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_privacy_settings_experience/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_privacy_settings_experience/</guid>
      <description>
        
          
            Detects registry modifications that disable Privacy Settings Experience
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable PUA Protection on Windows Defender</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_pua_protection_on_microsoft_defender/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_pua_protection_on_microsoft_defender/</guid>
      <description>
        
          
            Detects disabling Windows Defender PUA protection
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Security Events Logging Adding Reg Key MiniNt</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_disable_security_events_logging_adding_reg_key_minint/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_disable_security_events_logging_adding_reg_key_minint/</guid>
      <description>
        
          
            Detects the addition of a key &#39;MiniNt&#39; to the registry. Upon a reboot, Windows Event Log service will stop writing events.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Security Tools</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_disable_security_tools/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_disable_security_tools/</guid>
      <description>
        
          
            Detects disabling security tools
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable System Firewall</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/service_stop/lnx_auditd_disable_system_firewall/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/service_stop/lnx_auditd_disable_system_firewall/</guid>
      <description>
        
          
            Detects disabling of system firewalls which could be used by adversaries to bypass controls that limit usage of the network.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Tamper Protection on Windows Defender</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_tamper_protection_on_microsoft_defender/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_tamper_protection_on_microsoft_defender/</guid>
      <description>
        
          
            Detects disabling Windows Defender Tamper Protection
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Windows Defender AV Security Monitoring</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_disable_defender_av_security_monitoring/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_disable_defender_av_security_monitoring/</guid>
      <description>
        
          
            Detects attackers attempting to disable Windows Defender using Powershell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Windows Defender Functionalities Via Registry Keys</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_windows_defender_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_windows_defender_tamper/</guid>
      <description>
        
          
            Detects when attackers or tools disable Windows Defender functionalities via the Windows registry
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Windows Event Logging Via Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_winevt_logging/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_winevt_logging/</guid>
      <description>
        
          
            Detects tampering with the &#34;Enabled&#34; registry key in order to disable Windows logging of a Windows event channel
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Windows Firewall by Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_windows_firewall/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_windows_firewall/</guid>
      <description>
        
          
            Detect set EnableFirewall to 0 to disable the Windows firewall
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Windows IIS HTTP Logging</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_iis_appcmd_http_logging/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_iis_appcmd_http_logging/</guid>
      <description>
        
          
            Disables HTTP logging on a Windows IIS web server as seen by Threat Group 3390 (Bronze Union)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Windows Security Center Notifications</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_security_center_notifications/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_security_center_notifications/</guid>
      <description>
        
          
            Detect set UseActionCenterExperience to 0 to disable the Windows security center notification
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable-WindowsOptionalFeature Command PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_disable_windows_optional_feature/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_disable_windows_optional_feature/</guid>
      <description>
        
          
            Detect built in PowerShell cmdlet Disable-WindowsOptionalFeature, Deployment Image Servicing and Management tool.
Similar to DISM.exe, this cmdlet is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabled IE Security Features</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_disable_ie_features/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_disable_ie_features/</guid>
      <description>
        
          
            Detects command lines that indicate unwanted modifications to registry keys that disable important Internet Explorer security features
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabled MFA to Bypass Authentication Mechanisms</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_mfa_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_mfa_disabled/</guid>
      <description>
        
          
            Detection for when multi factor authentication has been disabled, which might indicate a malicious activity to bypass authentication mechanisms.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabled Volume Snapshots</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_volsnap_disable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_volsnap_disable/</guid>
      <description>
        
          
            Detects commands that temporarily turn off Volume Snapshots
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabled Windows Defender Eventlog</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_microsoft_defender_eventlog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_microsoft_defender_eventlog/</guid>
      <description>
        
          
            Detects the disabling of the Windows Defender eventlog as seen in relation to Lockbit 3.0 infections
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabling Multi Factor Authentication</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/m365/audit/microsoft365_disabling_mfa/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/m365/audit/microsoft365_disabling_mfa/</guid>
      <description>
        
          
            Detects disabling of Multi Factor Authentication.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabling Security Tools</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_security_tools_disabling/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_security_tools_disabling/</guid>
      <description>
        
          
            Detects disabling security tools
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabling Security Tools - Builtin</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/builtin/syslog/lnx_syslog_security_tools_disabling_syslog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/builtin/syslog/lnx_syslog_security_tools_disabling_syslog/</guid>
      <description>
        
          
            Detects disabling security tools
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabling Windows Defender WMI Autologger Session via Reg.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_disable_defender_wmi_autologger/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_disable_defender_wmi_autologger/</guid>
      <description>
        
          
            Detects the use of reg.exe to disable the Event Tracing for Windows (ETW) Autologger session for Windows Defender API and Audit events.
By setting the &#39;Start&#39; value to &#39;0&#39; for the &#39;DefenderApiLogger&#39; or &#39;DefenderAuditLogger&#39; session, an attacker can prevent these critical security events
from being logged, effectively blinding monitoring tools that rely on this data. This is a powerful defense evasion technique.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Dism Remove Online Package</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dism_remove/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dism_remove/</guid>
      <description>
        
          
            Deployment Image Servicing and Management tool. DISM is used to enumerate, install, uninstall, configure, and update features and packages in Windows images
          
          
        
      </description>
    </item>
    
    <item>
      <title>DNS-over-HTTPS Enabled by Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dns_over_https_enabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dns_over_https_enabled/</guid>
      <description>
        
          
            Detects when a user enables DNS-over-HTTPS.
This can be used to hide internet activity or be used to hide the process of exfiltrating data.
With this enabled organization will lose visibility into data such as query type, response and originating IP that are used to determine bad actors.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Dropping Of Password Filter DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_credential_access_via_password_filter/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_credential_access_via_password_filter/</guid>
      <description>
        
          
            Detects dropping of dll files in system32 that may be used to retrieve user credentials from LSASS
          
          
        
      </description>
    </item>
    
    <item>
      <title>DumpStack.log Defender Evasion</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_dumpstack_log_evasion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_dumpstack_log_evasion/</guid>
      <description>
        
          
            Detects the use of the filename DumpStack.log to evade Microsoft Defender
          
          
        
      </description>
    </item>
    
    <item>
      <title>Enable LM Hash Storage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_system_lsa_nolmhash/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_system_lsa_nolmhash/</guid>
      <description>
        
          
            Detects changes to the &#34;NoLMHash&#34; registry value in order to allow Windows to store LM Hashes.
By setting this registry value to &#34;0&#34; (DWORD), Windows will be allowed to store a LAN manager hash of your password in Active Directory and local SAM databases.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Enable LM Hash Storage - ProcCreation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_nolmhash/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_nolmhash/</guid>
      <description>
        
          
            Detects changes to the &#34;NoLMHash&#34; registry value in order to allow Windows to store LM Hashes.
By setting this registry value to &#34;0&#34; (DWORD), Windows will be allowed to store a LAN manager hash of your password in Active Directory and local SAM databases.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Enable Remote Connection Between Anonymous Computer - AllowAnonymousCallback</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_set_enable_anonymous_connection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_set_enable_anonymous_connection/</guid>
      <description>
        
          
            Detects enabling of the &#34;AllowAnonymousCallback&#34; registry value, which allows a remote connection between computers that do not have a trust relationship.
          
          
        
      </description>
    </item>
    
    <item>
      <title>ESXi Syslog Configuration Change Via ESXCLI</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_esxcli_syslog_config_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_esxcli_syslog_config_change/</guid>
      <description>
        
          
            Detects changes to the ESXi syslog configuration via &#34;esxcli&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Logging Disabled For rpcrt4.dll</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_rpcrt4_etw_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_rpcrt4_etw_tamper/</guid>
      <description>
        
          
            Detects changes to the &#34;ExtErrorInformation&#34; key in order to disable ETW logging for rpcrt4.dll
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Logging Disabled For SCM</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_services_etw_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_services_etw_tamper/</guid>
      <description>
        
          
            Detects changes to the &#34;TracingDisabled&#34; key in order to disable ETW logging for services.exe (SCM)
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Logging Disabled In .NET Processes - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_dot_net_etw_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_dot_net_etw_tamper/</guid>
      <description>
        
          
            Potential adversaries stopping ETW providers recording loaded .NET assemblies.
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Logging Disabled In .NET Processes - Sysmon Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dot_net_etw_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dot_net_etw_tamper/</guid>
      <description>
        
          
            Potential adversaries stopping ETW providers recording loaded .NET assemblies.
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Logging Tamper In .NET Processes Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_etw_modification_cmdline/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_etw_modification_cmdline/</guid>
      <description>
        
          
            Detects changes to environment variables related to ETW logging via the CommandLine.
This could indicate potential adversaries stopping ETW providers recording loaded .NET assemblies.

          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Logging/Processing Option Disabled On IIS Server</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_logging_etw_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_logging_etw_disabled/</guid>
      <description>
        
          
            Detects changes to of the IIS server configuration in order to disable/remove the ETW logging/processing option.
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Trace Evasion Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_etw_trace_evasion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_etw_trace_evasion/</guid>
      <description>
        
          
            Detects command line activity that tries to clear or disable any ETW trace log which could be a sign of logging evasion.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Eventlog Cleared</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_eventlog/win_system_eventlog_cleared/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_eventlog/win_system_eventlog_cleared/</guid>
      <description>
        
          
            One of the Windows Eventlogs has been cleared. e.g. caused by &#34;wevtutil cl&#34; command execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>EVTX Created In Uncommon Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_create_evtx_non_common_locations/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_create_evtx_non_common_locations/</guid>
      <description>
        
          
            Detects the creation of new files with the &#34;.evtx&#34; extension in non-common or non-standard location.
This could indicate tampering with default EVTX locations in order to evade security controls or simply exfiltration of event log to search for sensitive information within.
Note that backup software and legitimate administrator might perform similar actions during troubleshooting.

          
          
        
      </description>
    </item>
    
    <item>
      <title>File or Folder Permissions Change</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_file_or_folder_permissions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_file_or_folder_permissions/</guid>
      <description>
        
          
            Detects file and folder permission changes.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Filter Driver Unloaded Via Fltmc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver/</guid>
      <description>
        
          
            Detect filter driver unloading activity via fltmc.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Firewall Disabled via Netsh.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_disable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_disable/</guid>
      <description>
        
          
            Detects netsh commands that turns off the Windows firewall
          
          
        
      </description>
    </item>
    
    <item>
      <title>Firewall Rule Deleted Via Netsh.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_delete_rule/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_delete_rule/</guid>
      <description>
        
          
            Detects the removal of a port or application rule in the Windows Firewall configuration using netsh
          
          
        
      </description>
    </item>
    
    <item>
      <title>Firewall Rule Update Via Netsh.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_set_rule/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_set_rule/</guid>
      <description>
        
          
            Detects execution of netsh with the &#34;advfirewall&#34; and the &#34;set&#34; option in order to set new values for properties of a existing rule
          
          
        
      </description>
    </item>
    
    <item>
      <title>FlowCloud Registry Markers</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/flowcloud/registry_event_malware_flowcloud_markers/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/flowcloud/registry_event_malware_flowcloud_markers/</guid>
      <description>
        
          
            Detects FlowCloud malware registry markers from threat group TA410.
The malware stores its configuration in the registry alongside drivers utilized by the malware&#39;s keylogger components.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Flush Iptables Ufw Chain</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_iptables_flush_ufw/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_iptables_flush_ufw/</guid>
      <description>
        
          
            Detect use of iptables to flush all firewall rules, tables and chains and allow all network traffic
          
          
        
      </description>
    </item>
    
    <item>
      <title>Folder Removed From Exploit Guard ProtectedFolders List - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_exploit_guard_protected_folders/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_exploit_guard_protected_folders/</guid>
      <description>
        
          
            Detects the removal of folders from the &#34;ProtectedFolders&#34; list of of exploit guard. This could indicate an attacker trying to launch an encryption process or trying to manipulate data inside of the protected folder
          
          
        
      </description>
    </item>
    
    <item>
      <title>Forest Blizzard APT - File Creation Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/forest-blizzard/file_event_win_apt_forest_blizzard_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/forest-blizzard/file_event_win_apt_forest_blizzard_activity/</guid>
      <description>
        
          
            Detects the creation of specific files inside of ProgramData directory.
These files were seen being created by Forest Blizzard as described by MSFT.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Forest Blizzard APT - JavaScript Constrained File Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/forest-blizzard/file_event_win_apt_forest_blizzard_constrained_js/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/forest-blizzard/file_event_win_apt_forest_blizzard_constrained_js/</guid>
      <description>
        
          
            Detects the creation of JavaScript files inside of the DriverStore directory.
Forest Blizzard used this to exploit the CVE-2022-38028 vulnerability in Windows Print Spooler service by modifying a JavaScript constraints file and executing it with SYSTEM-level permissions.

          
          
        
      </description>
    </item>
    
    <item>
      <title>FortiGate - Firewall Address Object Added</title>
      <link>https://detection.fyi/sigmahq/sigma/network/fortinet/fortigate/fortinet_fortigate_new_firewall_address_object/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/fortinet/fortigate/fortinet_fortigate_new_firewall_address_object/</guid>
      <description>
        
          
            Detects the addition of firewall address objects on a Fortinet FortiGate Firewall.
          
          
        
      </description>
    </item>
    
    <item>
      <title>FortiGate - New Firewall Policy Added</title>
      <link>https://detection.fyi/sigmahq/sigma/network/fortinet/fortigate/fortinet_fortigate_new_firewall_policy_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/fortinet/fortigate/fortinet_fortigate_new_firewall_policy_added/</guid>
      <description>
        
          
            Detects the addition of a new firewall policy on a Fortinet FortiGate Firewall.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Gatekeeper Bypass via Xattr</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_xattr_gatekeeper_bypass/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_xattr_gatekeeper_bypass/</guid>
      <description>
        
          
            Detects macOS Gatekeeper bypass via xattr utility
          
          
        
      </description>
    </item>
    
    <item>
      <title>Github High Risk Configuration Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/application/github/audit/github_disable_high_risk_configuration/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/github/audit/github_disable_high_risk_configuration/</guid>
      <description>
        
          
            Detects when a user disables a critical security feature for an organization.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Github Push Protection Bypass Detected</title>
      <link>https://detection.fyi/sigmahq/sigma/application/github/audit/github_push_protection_bypass_detected/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/github/audit/github_push_protection_bypass_detected/</guid>
      <description>
        
          
            Detects when a user bypasses the push protection on a secret detected by secret scanning.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Github Push Protection Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/application/github/audit/github_push_protection_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/github/audit/github_push_protection_disabled/</guid>
      <description>
        
          
            Detects if the push protection feature is disabled for an organization, enterprise, repositories or custom pattern rules.
          
          
        
      </description>
    </item>
    
    <item>
      <title>GitHub Repository Archive Status Changed</title>
      <link>https://detection.fyi/sigmahq/sigma/application/github/audit/github_repository_archive_status_changed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/github/audit/github_repository_archive_status_changed/</guid>
      <description>
        
          
            Detects when a GitHub repository is archived or unarchived, which may indicate unauthorized changes to repository status.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Github Secret Scanning Feature Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/application/github/audit/github_secret_scanning_feature_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/github/audit/github_secret_scanning_feature_disabled/</guid>
      <description>
        
          
            Detects if the secret scanning feature is disabled for an enterprise or repository.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Google Cloud Firewall Modified or Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/gcp/audit/gcp_firewall_rule_modified_or_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/gcp/audit/gcp_firewall_rule_modified_or_deleted/</guid>
      <description>
        
          
            Detects  when a firewall rule is modified or deleted in Google Cloud Platform (GCP).
          
          
        
      </description>
    </item>
    
    <item>
      <title>Group Policy Abuse for Privilege Addition</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_group_policy_abuse_privilege_addition/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_group_policy_abuse_privilege_addition/</guid>
      <description>
        
          
            Detects the first occurrence of a modification to Group Policy Object Attributes to add privileges to user accounts or use them to add users as local admins.

          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - CobaltStrike BOF Injection Pattern</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_hktl_cobaltstrike_bof_injection_pattern/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_hktl_cobaltstrike_bof_injection_pattern/</guid>
      <description>
        
          
            Detects a typical pattern of a CobaltStrike BOF which inject into other processes
          
          
        
      </description>
    </item>
    
    <item>
      <title>Hacktool - EDR-Freeze Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_edr_freeze/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_edr_freeze/</guid>
      <description>
        
          
            Detects execution of EDR-Freeze, a tool that exploits the MiniDumpWriteDump function and WerFaultSecure.exe to suspend EDR and Antivirus processes on Windows.
EDR-Freeze leverages a race-condition attack to put security processes into a dormant state by suspending WerFaultSecure at the moment it freezes the target process.
This technique does not require kernel-level exploits or BYOVD, but instead abuses user-mode functionality to temporarily disable monitoring by EDR or Antimalware solutions.

          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - EDRSilencer Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_edrsilencer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_edrsilencer/</guid>
      <description>
        
          
            Detects the execution of EDRSilencer, a tool that leverages Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server based on PE metadata information.

          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - EDRSilencer Execution - Filter Added</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_hktl_edr_silencer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_hktl_edr_silencer/</guid>
      <description>
        
          
            Detects execution of EDRSilencer, a tool that abuses the Windows Filtering Platform (WFP) to block the outbound traffic of running EDR agents based on specific hardcoded filter names.

          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - PowerTool Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_powertool/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_powertool/</guid>
      <description>
        
          
            Detects the execution of the tool PowerTool which has the ability to kill a process, delete its process file, unload drivers, and delete the driver files
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - SharpEvtMute DLL Load</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_hktl_sharpevtmute/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_hktl_sharpevtmute/</guid>
      <description>
        
          
            Detects the load of EvtMuteHook.dll, a key component of SharpEvtHook, a tool that tampers with the Windows event logs
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - SharpEvtMute Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_sharpevtmute/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_sharpevtmute/</guid>
      <description>
        
          
            Detects the use of SharpEvtHook, a tool that tampers with the Windows event logs
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - Stracciatella Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_stracciatella_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_stracciatella_execution/</guid>
      <description>
        
          
            Detects Stracciatella which executes a Powershell runspace from within C# (aka SharpPick technique) with AMSI, ETW and Script Block Logging disabled based on PE metadata characteristics.
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - SysmonEnte Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_hktl_sysmonente/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_hktl_sysmonente/</guid>
      <description>
        
          
            Detects the use of SysmonEnte, a tool to attack the integrity of Sysmon
          
          
        
      </description>
    </item>
    
    <item>
      <title>Hide Schedule Task Via Index Value Tamper</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_hide_scheduled_task_via_index_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_hide_scheduled_task_via_index_tamper/</guid>
      <description>
        
          
            Detects when the &#34;index&#34; value of a scheduled task is modified from the registry
Which effectively hides it from any tooling such as &#34;schtasks /query&#34; (Read the referenced link for more information about the effects of this technique)

          
          
        
      </description>
    </item>
    
    <item>
      <title>HTTP Logging Disabled On IIS Server</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_logging_http_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_logging_http_disabled/</guid>
      <description>
        
          
            Detects changes to of the IIS server configuration in order to disable HTTP logging for successful requests.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Hypervisor Enforced Paging Translation Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_deviceguard_hypervisorenforcedpagingtranslation_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_deviceguard_hypervisorenforcedpagingtranslation_disabled/</guid>
      <description>
        
          
            Detects changes to the &#34;DisableHypervisorEnforcedPagingTranslation&#34; registry value. Where the it is set to &#34;1&#34; in order to disable the Hypervisor Enforced Paging Translation feature.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Hypervisor-protected Code Integrity (HVCI) Related Registry Tampering Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hvci_registry_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hvci_registry_tampering/</guid>
      <description>
        
          
            Detects the tampering of Hypervisor-protected Code Integrity (HVCI) related registry values via command line tool reg.exe.
HVCI uses virtualization-based security to protect code integrity by ensuring that only trusted code can run in kernel mode.
Adversaries may tamper with HVCI to load malicious or unsigned drivers, which can be used to escalate privileges, maintain persistence, or evade security mechanisms.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Important Windows Event Auditing Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_disable_event_auditing_critical/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_disable_event_auditing_critical/</guid>
      <description>
        
          
            Detects scenarios where system auditing for important events such as &#34;Process Creation&#34; or &#34;Logon&#34; events is disabled.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Important Windows Eventlog Cleared</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_eventlog/win_system_susp_eventlog_cleared/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_eventlog/win_system_susp_eventlog_cleared/</guid>
      <description>
        
          
            Detects the clearing of one of the Windows Core Eventlogs. e.g. caused by &#34;wevtutil cl&#34; command execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>Imports Registry Key From a File</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regedit_import_keys/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regedit_import_keys/</guid>
      <description>
        
          
            Detects the import of the specified file to the registry with regedit.exe.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Imports Registry Key From an ADS</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regedit_import_keys_ads/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regedit_import_keys_ads/</guid>
      <description>
        
          
            Detects the import of a alternate datastream to the registry with regedit.exe.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Indicator Removal on Host - Clear Mac System Logs</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_clear_system_logs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_clear_system_logs/</guid>
      <description>
        
          
            Detects deletion of local audit logs
          
          
        
      </description>
    </item>
    
    <item>
      <title>Install Root Certificate</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_install_root_certificate/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_install_root_certificate/</guid>
      <description>
        
          
            Detects installation of new certificate on the system which attackers may use to avoid warnings when connecting to controlled web servers or C2s
          
          
        
      </description>
    </item>
    
    <item>
      <title>Internet Explorer DisableFirstRunCustomize Enabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_internet_explorer_disable_first_run_customize/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_internet_explorer_disable_first_run_customize/</guid>
      <description>
        
          
            Detects changes to the Internet Explorer &#34;DisableFirstRunCustomize&#34; value, which prevents Internet Explorer from running the first run wizard the first time a user starts the browser after installing Internet Explorer or Windows.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Kapeka Backdoor Configuration Persistence</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/kapeka/registry_set_malware_kapeka_backdoor_configuration/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/kapeka/registry_set_malware_kapeka_backdoor_configuration/</guid>
      <description>
        
          
            Detects registry set activity of a value called &#34;Seed&#34; stored in the &#34;\Cryptography\Providers\&#34; registry key.
The Kapeka backdoor leverages this location to register a new SIP provider for backdoor configuration persistence.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Kaspersky Endpoint Security Stopped Via CommandLine - Linux</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_av_kaspersky_av_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_av_kaspersky_av_disabled/</guid>
      <description>
        
          
            Detects execution of the Kaspersky init.d stop script on Linux systems either directly or via systemctl.
This activity may indicate a manual interruption of the antivirus service by an administrator, or it could be a sign of potential tampering or evasion attempts by malicious actors.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Linux Logs Clearing Attempts</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_clear_logs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_clear_logs/</guid>
      <description>
        
          
            Detects logs clearing attempts on Linux systems via utilities such as &#39;rm&#39;, &#39;rmdir&#39;, &#39;shred&#39;, and &#39;unlink&#39; targeting log files and directories.
Adversaries often try to clear logs to cover their tracks after performing malicious activities.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Load Of RstrtMgr.DLL By A Suspicious Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_rstrtmgr_suspicious_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_rstrtmgr_suspicious_load/</guid>
      <description>
        
          
            Detects the load of RstrtMgr DLL (Restart Manager) by a suspicious process.
This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (e.g. Conti ransomware, Cactus ransomware). It has also recently been seen used by the BiBi wiper for Windows.
It could also be used for anti-analysis purposes by shut downing specific processes.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Load Of RstrtMgr.DLL By An Uncommon Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_rstrtmgr_uncommon_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_rstrtmgr_uncommon_load/</guid>
      <description>
        
          
            Detects the load of RstrtMgr DLL (Restart Manager) by an uncommon process.
This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (e.g. Conti ransomware, Cactus ransomware). It has also recently been seen used by the BiBi wiper for Windows.
It could also be used for anti-analysis purposes by shut downing specific processes.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Logging Configuration Changes on Linux Host</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/path/lnx_auditd_logging_config_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/path/lnx_auditd_logging_config_change/</guid>
      <description>
        
          
            Detect changes of syslog daemons configuration files
          
          
        
      </description>
    </item>
    
    <item>
      <title>LSA PPL Protection Setting Modification via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lsa_ppl_protection_setting_modification_via_cli/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lsa_ppl_protection_setting_modification_via_cli/</guid>
      <description>
        
          
            Detects modification of LSA PPL protection settings via CommandLine.
It may indicate an attempt to disable protection and enable credential dumping tools to access LSASS process memory.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Macro Enabled In A Potentially Suspicious Document</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_trust_record_susp_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_trust_record_susp_location/</guid>
      <description>
        
          
            Detects registry changes to Office trust records where the path is located in a potentially suspicious location
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Defender Tamper Protection Trigger</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_tamper_protection_trigger/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_tamper_protection_trigger/</guid>
      <description>
        
          
            Detects blocked attempts to change any of Defender&#39;s settings such as &#34;Real Time Monitoring&#34; and &#34;Behavior Monitoring&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Malware Protection Engine Crash</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/application/application_error/win_application_error_msmpeng_crash/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/application/application_error/win_application_error_msmpeng_crash/</guid>
      <description>
        
          
            This rule detects a suspicious crash of the Microsoft Malware Protection Engine
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Malware Protection Engine Crash - WER</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/application/windows_error_reporting/win_application_msmpeng_crash_wer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/application/windows_error_reporting/win_application_msmpeng_crash_wer/</guid>
      <description>
        
          
            This rule detects a suspicious crash of the Microsoft Malware Protection Engine
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Office Protected View Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_disable_protected_view_features/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_disable_protected_view_features/</guid>
      <description>
        
          
            Detects changes to Microsoft Office protected view registry keys with which the attacker disables this feature.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Modification of IE Registry Settings</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_ie/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_ie/</guid>
      <description>
        
          
            Detects modification of the registry settings used for Internet Explorer and other Windows components that use these settings. An attacker can abuse this registry key to add a domain to the trusted sites Zone or insert JavaScript for persistence
          
          
        
      </description>
    </item>
    
    <item>
      <title>Modify Group Policy Settings</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_modify_group_policy_settings/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_modify_group_policy_settings/</guid>
      <description>
        
          
            Detect malicious GPO modifications can be used to implement many other malicious behaviors.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Modify Group Policy Settings - ScriptBlockLogging</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_modify_group_policy_settings/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_modify_group_policy_settings/</guid>
      <description>
        
          
            Detect malicious GPO modifications can be used to implement many other malicious behaviors.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Modify System Firewall</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_modify_system_firewall/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_modify_system_firewall/</guid>
      <description>
        
          
            Detects the removal of system firewall rules. Adversaries may only delete or modify a specific system firewall rule to bypass controls limiting network usage or access.
Detection rules that match only on the disabling of firewalls will miss this.

          
          
        
      </description>
    </item>
    
    <item>
      <title>MSSQL Disable Audit Settings</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/application/mssqlserver/win_mssql_disable_audit_settings/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/application/mssqlserver/win_mssql_disable_audit_settings/</guid>
      <description>
        
          
            Detects when an attacker calls the &#34;ALTER SERVER AUDIT&#34; or &#34;DROP SERVER AUDIT&#34; transaction in order to delete or disable audit logs on the server
          
          
        
      </description>
    </item>
    
    <item>
      <title>NET NGenAssemblyUsageLog Registry Key Tamper</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_net_cli_ngenassemblyusagelog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_net_cli_ngenassemblyusagelog/</guid>
      <description>
        
          
            Detects changes to the NGenAssemblyUsageLog registry key.
.NET Usage Log output location can be controlled by setting the NGenAssemblyUsageLog CLR configuration knob in the Registry or by configuring an environment variable (as described in the next section).
By simplify specifying an arbitrary value (e.g. fake output location or junk data) for the expected value, a Usage Log file for the .NET execution context will not be created.

          
          
        
      </description>
    </item>
    
    <item>
      <title>NetNTLM Downgrade Attack</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_net_ntlm_downgrade/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_net_ntlm_downgrade/</guid>
      <description>
        
          
            Detects NetNTLM downgrade attack
          
          
        
      </description>
    </item>
    
    <item>
      <title>NetNTLM Downgrade Attack - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_net_ntlm_downgrade/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_net_ntlm_downgrade/</guid>
      <description>
        
          
            Detects NetNTLM downgrade attack
          
          
        
      </description>
    </item>
    
    <item>
      <title>Netsh Allow Group Policy on Microsoft Defender Firewall</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_enable_group_rule/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_enable_group_rule/</guid>
      <description>
        
          
            Adversaries may modify system firewalls in order to bypass controls limiting network usage
          
          
        
      </description>
    </item>
    
    <item>
      <title>New BgInfo.EXE Custom DB Path Registry Configuration</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_bginfo_custom_db/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_bginfo_custom_db/</guid>
      <description>
        
          
            Detects setting of a new registry database value related to BgInfo configuration. Attackers can for example set this value to save the results of the commands executed by BgInfo in order to exfiltrate information.
          
          
        
      </description>
    </item>
    
    <item>
      <title>New BgInfo.EXE Custom VBScript Registry Configuration</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_bginfo_custom_vbscript/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_bginfo_custom_vbscript/</guid>
      <description>
        
          
            Detects setting of a new registry value related to BgInfo configuration, which can be abused to execute custom VBScript via &#34;BgInfo.exe&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>New BgInfo.EXE Custom WMI Query Registry Configuration</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_bginfo_custom_wmi_query/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_bginfo_custom_wmi_query/</guid>
      <description>
        
          
            Detects setting of a new registry value related to BgInfo configuration, which can be abused to execute custom WMI query via &#34;BgInfo.exe&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>New DNS ServerLevelPluginDll Installed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dns_server_level_plugin_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dns_server_level_plugin_dll/</guid>
      <description>
        
          
            Detects the installation of a DNS plugin DLL via ServerLevelPluginDll parameter in registry, which can be used to execute code in context of the DNS server (restart required)
          
          
        
      </description>
    </item>
    
    <item>
      <title>New DNS ServerLevelPluginDll Installed Via Dnscmd.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dnscmd_install_new_server_level_plugin_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dnscmd_install_new_server_level_plugin_dll/</guid>
      <description>
        
          
            Detects the installation of a DNS plugin DLL via ServerLevelPluginDll parameter in registry, which can be used to execute code in context of the DNS server (restart required)
          
          
        
      </description>
    </item>
    
    <item>
      <title>New Federated Domain Added</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/m365/audit/microsoft365_new_federated_domain_added_audit/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/m365/audit/microsoft365_new_federated_domain_added_audit/</guid>
      <description>
        
          
            Detects the addition of a new Federated Domain.
          
          
        
      </description>
    </item>
    
    <item>
      <title>New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_add_rule_susp_folder/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_add_rule_susp_folder/</guid>
      <description>
        
          
            Detects the addition of a new rule to the Windows Firewall exception list for an application located in a potentially suspicious location.
          
          
        
      </description>
    </item>
    
    <item>
      <title>New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_add_rule_wmiprvse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_add_rule_wmiprvse/</guid>
      <description>
        
          
            Detects the addition of a new &#34;Allow&#34; firewall rule by the WMI process (WmiPrvSE.EXE).
This can occur if an attacker leverages PowerShell cmdlets such as &#34;New-NetFirewallRule&#34;, or directly uses WMI CIM classes such as &#34;MSFT_NetFirewallRule&#34;.

          
          
        
      </description>
    </item>
    
    <item>
      <title>New Firewall Rule Added Via Netsh.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_add_rule/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_add_rule/</guid>
      <description>
        
          
            Detects the addition of a new rule to the Windows firewall via netsh
          
          
        
      </description>
    </item>
    
    <item>
      <title>New Module Module Added To IIS Server</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_module_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_module_added/</guid>
      <description>
        
          
            Detects the addition of a new module to an IIS server.
          
          
        
      </description>
    </item>
    
    <item>
      <title>New Network ACL Entry Added</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_new_acl_entries/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_new_acl_entries/</guid>
      <description>
        
          
            Detects that network ACL entries have been added to a route table which could indicate that new attack vectors have been opened up in the AWS account.

          
          
        
      </description>
    </item>
    
    <item>
      <title>New Network Route Added</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_new_route_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_new_route_added/</guid>
      <description>
        
          
            Detects the addition of a new network route to a route table in AWS.

          
          
        
      </description>
    </item>
    
    <item>
      <title>New Root Certificate Authority Added</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_new_root_ca_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_new_root_ca_added/</guid>
      <description>
        
          
            Detects newly added root certificate authority to an AzureAD tenant to support certificate based authentication.
          
          
        
      </description>
    </item>
    
    <item>
      <title>New Root Certificate Installed Via CertMgr.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certmgr_certificate_installation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certmgr_certificate_installation/</guid>
      <description>
        
          
            Detects execution of &#34;certmgr&#34; with the &#34;add&#34; flag in order to install a new certificate on the system.
Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

          
          
        
      </description>
    </item>
    
    <item>
      <title>New Root Certificate Installed Via Certutil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_certificate_installation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_certificate_installation/</guid>
      <description>
        
          
            Detects execution of &#34;certutil&#34; with the &#34;addstore&#34; flag in order to install a new certificate on the system.
Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Non-privileged Usage of Reg or Powershell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_non_priv_reg_or_ps/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_non_priv_reg_or_ps/</guid>
      <description>
        
          
            Search for usage of reg or Powershell by non-privileged users to modify service configuration in registry
          
          
        
      </description>
    </item>
    
    <item>
      <title>NotPetya Ransomware Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/notpetya/proc_creation_win_malware_notpetya/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/notpetya/proc_creation_win_malware_notpetya/</guid>
      <description>
        
          
            Detects NotPetya ransomware activity in which the extracted passwords are passed back to the main module via named pipe, the file system journal of drive C is deleted and Windows eventlogs are cleared using wevtutil
          
          
        
      </description>
    </item>
    
    <item>
      <title>NtdllPipe Like Activity Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_ntdllpipe_redirect/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_ntdllpipe_redirect/</guid>
      <description>
        
          
            Detects command that type the content of ntdll.dll to a different file or a pipe in order to evade AV / EDR detection. As seen being used in the POC NtdllPipe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Obfuscated PowerShell OneLiner Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_download_cradle_obfuscated/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_download_cradle_obfuscated/</guid>
      <description>
        
          
            Detects the execution of a specific OneLiner to download and execute powershell modules in memory.
          
          
        
      </description>
    </item>
    
    <item>
      <title>OceanLotus Registry Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/apt32-oceanlotus/registry_event_apt_oceanlotus_registry/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/apt32-oceanlotus/registry_event_apt_oceanlotus_registry/</guid>
      <description>
        
          
            Detects registry keys created in OceanLotus (also known as APT32) attacks
          
          
        
      </description>
    </item>
    
    <item>
      <title>Office Macros Warning Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_vba_warnings_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_vba_warnings_tamper/</guid>
      <description>
        
          
            Detects registry changes to Microsoft Office &#34;VBAWarning&#34; to a value of &#34;1&#34; which enables the execution of all macros, whether signed or unsigned.
          
          
        
      </description>
    </item>
    
    <item>
      <title>OilRig APT Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/oilrig/proc_creation_win_apt_oilrig_mar18/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/oilrig/proc_creation_win_apt_oilrig_mar18/</guid>
      <description>
        
          
            Detects OilRig activity as reported by Nyotron in their March 2018 report
          
          
        
      </description>
    </item>
    
    <item>
      <title>OilRig APT Registry Persistence</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/oilrig/registry_event_apt_oilrig_mar18/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/oilrig/registry_event_apt_oilrig_mar18/</guid>
      <description>
        
          
            Detects OilRig registry persistence as reported by Nyotron in their March 2018 report
          
          
        
      </description>
    </item>
    
    <item>
      <title>OilRig APT Schedule Task Persistence - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/oilrig/win_security_apt_oilrig_mar18/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/oilrig/win_security_apt_oilrig_mar18/</guid>
      <description>
        
          
            Detects OilRig schedule task persistence as reported by Nyotron in their March 2018 report
          
          
        
      </description>
    </item>
    
    <item>
      <title>OilRig APT Schedule Task Persistence - System</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/oilrig/win_system_apt_oilrig_mar18/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/oilrig/win_system_apt_oilrig_mar18/</guid>
      <description>
        
          
            Detects OilRig schedule task persistence as reported by Nyotron in their March 2018 report
          
          
        
      </description>
    </item>
    
    <item>
      <title>Okta MFA Reset or Deactivated</title>
      <link>https://detection.fyi/sigmahq/sigma/identity/okta/okta_mfa_reset_or_deactivated/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/identity/okta/okta_mfa_reset_or_deactivated/</guid>
      <description>
        
          
            Detects when an attempt at deactivating  or resetting MFA.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Okta User Session Start Via An Anonymising Proxy Service</title>
      <link>https://detection.fyi/sigmahq/sigma/identity/okta/okta_user_session_start_via_anonymised_proxy/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/identity/okta/okta_user_session_start_via_anonymised_proxy/</guid>
      <description>
        
          
            Detects when an Okta user session starts where the user is behind an anonymising proxy service.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Outlook EnableUnsafeClientMailRules Setting Enabled - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_outlook_enable_unsafe_client_mail_rules/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_outlook_enable_unsafe_client_mail_rules/</guid>
      <description>
        
          
            Detects an attacker trying to enable the outlook security setting &#34;EnableUnsafeClientMailRules&#34; which allows outlook to run applications or execute macros
          
          
        
      </description>
    </item>
    
    <item>
      <title>Persistence Via New SIP Provider</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_sip_persistence/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_sip_persistence/</guid>
      <description>
        
          
            Detects when an attacker register a new SIP provider for persistence and defense evasion
          
          
        
      </description>
    </item>
    
    <item>
      <title>Possible DC Shadow Attack</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_possible_dc_shadow/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_possible_dc_shadow/</guid>
      <description>
        
          
            Detects DCShadow via create new SPN
          
          
        
      </description>
    </item>
    
    <item>
      <title>Possible Shadow Credentials Added</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_possible_shadow_credentials_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_possible_shadow_credentials_added/</guid>
      <description>
        
          
            Detects possible addition of shadow credentials to an active directory object.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential AMSI Bypass Script Using NULL Bits</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_amsi_null_bits_bypass/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_amsi_null_bits_bypass/</guid>
      <description>
        
          
            Detects usage of special strings/null bits in order to potentially bypass AMSI functionalities
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential AMSI Bypass Using NULL Bits</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_amsi_null_bits_bypass/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_amsi_null_bits_bypass/</guid>
      <description>
        
          
            Detects usage of special strings/null bits in order to potentially bypass AMSI functionalities
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential AMSI Bypass Via .NET Reflection</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_amsi_init_failed_bypass/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_amsi_init_failed_bypass/</guid>
      <description>
        
          
            Detects Request to &#34;amsiInitFailed&#34; that can be used to disable AMSI Scanning
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential AMSI COM Server Hijacking</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_amsi_com_hijack/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_amsi_com_hijack/</guid>
      <description>
        
          
            Detects changes to the AMSI come server registry key in order disable AMSI scanning functionalities. When AMSI attempts to starts its COM component, it will query its registered CLSID and return a non-existent COM server. This causes a load failure and prevents any scanning methods from being accessed, ultimately rendering AMSI useless
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Attachment Manager Settings Associations Tamper</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_policies_associations_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_policies_associations_tamper/</guid>
      <description>
        
          
            Detects tampering with attachment manager settings policies associations to lower the default file type risks (See reference for more information)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Attachment Manager Settings Attachments Tamper</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_policies_attachments_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_policies_attachments_tamper/</guid>
      <description>
        
          
            Detects tampering with attachment manager settings policies attachments (See reference for more information)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential AutoLogger Sessions Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_autologger_sessions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_autologger_sessions/</guid>
      <description>
        
          
            Detects tampering with autologger trace sessions which is a technique used by attackers to disable logging.
The AutoLogger event tracing session records events up that occur early in the operating system boot process.
Applications and device drivers can use the AutoLogger session to capture traces before the user logs in, and also used by security solutions as telemetry source.
Adversaries may disable these sessions to evade detection and prevent security monitoring of early boot activities and system events.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential EventLog File Location Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_evtx_file_key_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_evtx_file_key_tamper/</guid>
      <description>
        
          
            Detects tampering with EventLog service &#34;file&#34; key. In order to change the default location of an Evtx file. This technique is used to tamper with log collection and alerting
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Ke3chang/TidePool Malware Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/ke3chang-tidepool/proc_creation_win_malware_ke3chang_tidepool/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/ke3chang-tidepool/proc_creation_win_malware_ke3chang_tidepool/</guid>
      <description>
        
          
            Detects registry modifications potentially related to the Ke3chang/TidePool malware as seen in campaigns running in 2019 and 2020
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential NetWire RAT Activity - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/netwire/registry_add_malware_netwire/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/netwire/registry_add_malware_netwire/</guid>
      <description>
        
          
            Detects registry keys related to NetWire RAT
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Persistence Via Custom Protocol Handler</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_custom_protocol_handler/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_custom_protocol_handler/</guid>
      <description>
        
          
            Detects potential persistence activity via the registering of a new custom protocole handlers. While legitimate applications register protocole handlers often times during installation. And attacker can abuse this by setting a custom handler to be used as a persistence mechanism.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Persistence Via Event Viewer Events.asp</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_event_viewer_events_asp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_event_viewer_events_asp/</guid>
      <description>
        
          
            Detects potential registry persistence technique using the Event Viewer &#34;Events.asp&#34; technique
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Persistence Via Outlook Home Page</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_outlook_homepage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_outlook_homepage/</guid>
      <description>
        
          
            Detects potential persistence activity via outlook home page.
An attacker can set a home page to achieve code execution and persistence by editing the WebView registry keys.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Persistence Via Outlook Today Page</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_outlook_todaypage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_outlook_todaypage/</guid>
      <description>
        
          
            Detects potential persistence activity via outlook today page.
An attacker can set a custom page to execute arbitrary code and link to it via the registry values &#34;URL&#34; and &#34;UserDefinedUrl&#34;.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Persistence Via Security Descriptors - ScriptBlock</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_ace_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_ace_tampering/</guid>
      <description>
        
          
            Detects usage of certain functions and keywords that are used to manipulate security descriptors in order to potentially set a backdoor. As seen used in the DAMP project.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential PowerShell Execution Policy Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_powershell_execution_policy/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_powershell_execution_policy/</guid>
      <description>
        
          
            Detects changes to the PowerShell execution policy in order to bypass signing requirements for script execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential PowerShell Execution Policy Tampering - ProcCreation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_set_unsecure_powershell_policy/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_set_unsecure_powershell_policy/</guid>
      <description>
        
          
            Detects changes to the PowerShell execution policy registry key in order to bypass signing requirements for script execution from the CommandLine
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Privileged System Service Operation - SeLoadDriverPrivilege</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_user_driver_loaded/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_user_driver_loaded/</guid>
      <description>
        
          
            Detects the usage of the &#39;SeLoadDriverPrivilege&#39; privilege. This privilege is required to load or unload a device driver.
With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode.
This user right does not apply to Plug and Play device drivers.
If you exclude privileged users/admins and processes, which are allowed to do so, you are maybe left with bad programs trying to load malicious kernel drivers.
This will detect Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs) and the usage of Sysinternals and various other tools. So you have to work with a whitelist to find the bad stuff.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Qakbot Registry Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_malware_qakbot_registry/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_malware_qakbot_registry/</guid>
      <description>
        
          
            Detects a registry key used by IceID in a campaign that distributes malicious OneNote files
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Raspberry Robin Registry Set Internet Settings ZoneMap</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/raspberry-robin/registry_set_malware_raspberry_robin_internet_settings_zonemap_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/raspberry-robin/registry_set_malware_raspberry_robin_internet_settings_zonemap_tamper/</guid>
      <description>
        
          
            Detects registry modifications related to the proxy configuration of the system, potentially associated with the Raspberry Robin malware, as seen in campaigns running in Q1 2024.
Raspberry Robin may alter proxy settings to circumvent security measures, ensuring unhindered connection with Command and Control servers for maintaining control over compromised systems if there are any proxy settings that are blocking connections.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Secure Deletion with SDelete</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_sdelete_potential_secure_deletion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_sdelete_potential_secure_deletion/</guid>
      <description>
        
          
            Detects files that have extensions commonly seen while SDelete is used to wipe files.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Suspicious Activity Using SeCEdit</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_secedit_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_secedit_execution/</guid>
      <description>
        
          
            Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Suspicious Registry File Imported Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_import_from_suspicious_paths/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_import_from_suspicious_paths/</guid>
      <description>
        
          
            Detects the import of &#39;.reg&#39; files from suspicious paths using the &#39;reg.exe&#39; utility
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Tampering With RDP Related Registry Keys Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_rdp_keys_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_rdp_keys_tamper/</guid>
      <description>
        
          
            Detects the execution of &#34;reg.exe&#34; for enabling/disabling the RDP service on the host by tampering with the &#39;CurrentControlSet\Control\Terminal Server&#39; values
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Tampering With Security Products Via WMIC</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_uninstall_security_products/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_uninstall_security_products/</guid>
      <description>
        
          
            Detects uninstallation or termination of security products using the WMIC utility
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Ursnif Malware Activity - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/malware/ursnif/registry_add_malware_ursnif/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/malware/ursnif/registry_add_malware_ursnif/</guid>
      <description>
        
          
            Detects registry keys related to Ursnif malware.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Windows Defender Tampering Via Wmic.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_namespace_defender/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_namespace_defender/</guid>
      <description>
        
          
            Detects potential tampering with Windows Defender settings such as adding exclusion using wmic
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Call To Win32_NTEventlogFile Class</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_nteventlogfile_usage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_nteventlogfile_usage/</guid>
      <description>
        
          
            Detects usage of the WMI class &#34;Win32_NTEventlogFile&#34; in a potentially suspicious way (delete, backup, change permissions, etc.) from a PowerShell script
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Call To Win32_NTEventlogFile Class - PSScript</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_win32_nteventlogfile_usage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_win32_nteventlogfile_usage/</guid>
      <description>
        
          
            Detects usage of the WMI class &#34;Win32_NTEventlogFile&#34; in a potentially suspicious way (delete, backup, change permissions, etc.) from a PowerShell script
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Desktop Background Change Using Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_desktop_background_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_desktop_background_change/</guid>
      <description>
        
          
            Detects the execution of &#34;reg.exe&#34; to alter registry keys that would replace the user&#39;s desktop background.
This is a common technique used by malware to change the desktop background to a ransom note or other image.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Desktop Background Change Via Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_desktop_background_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_desktop_background_change/</guid>
      <description>
        
          
            Detects registry value settings that would replace the user&#39;s desktop background.
This is a common technique used by malware to change the desktop background to a ransom note or other image.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious NTFS Symlink Behavior Modification</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fsutil_symlinkevaluation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fsutil_symlinkevaluation/</guid>
      <description>
        
          
            Detects the modification of NTFS symbolic link behavior using fsutil, which could be used to enable remote to local or remote to remote symlinks for potential attacks.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious WDAC Policy File Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_wdac_policy_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_wdac_policy_creation/</guid>
      <description>
        
          
            Detects suspicious Windows Defender Application Control (WDAC) policy file creation from abnormal processes that could be abused by attacker to block EDR/AV components while allowing their own malicious code to run on the system.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Powershell Base64 Encoded MpPreference Cmdlet</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_mppreference/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_mppreference/</guid>
      <description>
        
          
            Detects base64 encoded &#34;MpPreference&#34; PowerShell cmdlet code that tries to modifies or tamper with Windows Defender AV
          
          
        
      </description>
    </item>
    
    <item>
      <title>Powershell Defender Disable Scan Feature</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_defender_disable_feature/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_defender_disable_feature/</guid>
      <description>
        
          
            Detects requests to disable Microsoft Defender features using PowerShell commands
          
          
        
      </description>
    </item>
    
    <item>
      <title>Powershell Defender Exclusion</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_defender_exclusion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_defender_exclusion/</guid>
      <description>
        
          
            Detects requests to exclude files, folders or processes from Antivirus scanning using PowerShell cmdlets
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Defender Threat Severity Default Action Set to &#39;Allow&#39; or &#39;NoAction&#39;</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_defender_default_action_modified/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_defender_default_action_modified/</guid>
      <description>
        
          
            Detects the use of PowerShell to execute the &#39;Set-MpPreference&#39; cmdlet to configure Windows Defender&#39;s threat severity default action to &#39;Allow&#39; (value &#39;6&#39;) or &#39;NoAction&#39; (value &#39;9&#39;).
This is a highly suspicious configuration change that effectively disables Defender&#39;s ability to automatically mitigate threats of a certain severity level.
An attacker might use this technique via the command line to bypass defenses before executing payloads.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Powershell Install a DLL in System Directory</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_copy_item_system_directory/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_copy_item_system_directory/</guid>
      <description>
        
          
            Uses PowerShell to install/copy a file into a system directory such as &#34;System32&#34; or &#34;SysWOW64&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Logging Disabled Via Registry Key Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_powershell_logging_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_powershell_logging_disabled/</guid>
      <description>
        
          
            Detects changes to the registry for the currently logged-in user. In order to disable PowerShell module logging, script block logging or transcription and script execution logging
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Script Change Permission Via Set-Acl - PsScript</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_set_acl/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_set_acl/</guid>
      <description>
        
          
            Detects PowerShell scripts set ACL to of a file or a folder
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Set-Acl On Windows Folder - PsScript</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_set_acl_susp_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_set_acl_susp_location/</guid>
      <description>
        
          
            Detects PowerShell scripts to set the ACL to a file in the Windows folder
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Write-EventLog Usage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_write_eventlog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_write_eventlog/</guid>
      <description>
        
          
            Detects usage of the &#34;Write-EventLog&#34; cmdlet with &#39;RawData&#39; flag. The cmdlet can be levreage to write malicious payloads to the EventLog and then retrieve them later for later use
          
          
        
      </description>
    </item>
    
    <item>
      <title>PPL Tampering Via WerFaultSecure</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_werfaultsecure_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_werfaultsecure_abuse/</guid>
      <description>
        
          
            Detects potential abuse of WerFaultSecure.exe to dump Protected Process Light (PPL) processes like LSASS or to freeze security solutions (EDR/antivirus).
This technique is used by tools such as EDR-Freeze and WSASS to bypass PPL protections and access sensitive information or disable security software.
Distinct command line patterns help identify the specific tool:
- WSASS usage typically shows: &#34;WSASS.exe WerFaultSecure.exe [PID]&#34; in ParentCommandLine
- EDR-Freeze usage typically shows: &#34;EDR-Freeze_[version].exe [PID] [timeout]&#34; in ParentCommandLine
Legitimate debugging operations using WerFaultSecure are rare in production environments and should be investigated.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Previously Installed IIS Module Was Removed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_module_removed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_module_removed/</guid>
      <description>
        
          
            Detects the removal of a previously installed IIS module.
          
          
        
      </description>
    </item>
    
    <item>
      <title>PUA - CleanWipe Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_cleanwipe/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_cleanwipe/</guid>
      <description>
        
          
            Detects the use of CleanWipe a tool usually used to delete Symantec antivirus.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Python Function Execution Security Warning Disabled In Excel</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_office_disable_python_security_warnings/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_office_disable_python_security_warnings/</guid>
      <description>
        
          
            Detects changes to the registry value &#34;PythonFunctionWarnings&#34; that would prevent any warnings or alerts from showing when Python functions are about to be executed.
Threat actors could run malicious code through the new Microsoft Excel feature that allows Python to run within the spreadsheet.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Python Function Execution Security Warning Disabled In Excel - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_disable_python_security_warnings/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_disable_python_security_warnings/</guid>
      <description>
        
          
            Detects changes to the registry value &#34;PythonFunctionWarnings&#34; that would prevent any warnings or alerts from showing when Python functions are about to be executed.
Threat actors could run malicious code through the new Microsoft Excel feature that allows Python to run within the spreadsheet.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Raccine Uninstall</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_disable_raccine/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_disable_raccine/</guid>
      <description>
        
          
            Detects commands that indicate a Raccine removal from an end system. Raccine is a free ransomware protection tool.
          
          
        
      </description>
    </item>
    
    <item>
      <title>RDP Connection Allowed Via Netsh.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_allow_rdp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_allow_rdp/</guid>
      <description>
        
          
            Detects usage of the netsh command to open and allow connections to port 3389 (RDP). As seen used by Sarwent Malware
          
          
        
      </description>
    </item>
    
    <item>
      <title>RDP Sensitive Settings Changed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_terminal_server_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_terminal_server_tampering/</guid>
      <description>
        
          
            Detects tampering of RDP Terminal Service/Server sensitive settings.
Such as allowing unauthorized users access to a system via the &#39;fAllowUnsolicited&#39; or enabling RDP via &#39;fDenyTSConnections&#39;, etc.

Below is a list of registry keys/values that are monitored by this rule:

- Shadow: Used to enable Remote Desktop shadowing, which allows an administrator to view or control a user&#39;s session.
- DisableRemoteDesktopAntiAlias: Disables anti-aliasing for remote desktop sessions.
- DisableSecuritySettings: Disables certain security settings for Remote Desktop connections.
- fAllowUnsolicited: Allows unsolicited remote assistance offers.
- fAllowUnsolicitedFullControl: Allows unsolicited remote assistance offers with full control.
- InitialProgram: Specifies a program to run automatically when a user logs on to a remote computer.
- ServiceDll: Used in RDP hijacking techniques to specify a custom DLL to be loaded by the Terminal Services service.
- SecurityLayer: Specifies the security layer used for RDP connections.

          
          
        
      </description>
    </item>
    
    <item>
      <title>RDP Sensitive Settings Changed to Zero</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_terminal_server_suspicious/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_terminal_server_suspicious/</guid>
      <description>
        
          
            Detects tampering of RDP Terminal Service/Server sensitive settings.
Such as allowing unauthorized users access to a system via the &#39;fAllowUnsolicited&#39; or enabling RDP via &#39;fDenyTSConnections&#39;, etc.

          
          
        
      </description>
    </item>
    
    <item>
      <title>RedMimicry Winnti Playbook Registry Manipulation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_redmimicry_winnti_reg/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_redmimicry_winnti_reg/</guid>
      <description>
        
          
            Detects actions caused by the RedMimicry Winnti playbook
          
          
        
      </description>
    </item>
    
    <item>
      <title>RedSun - Named Pipe Created</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/pipe_created_win_exploit_redsun_named_pipe/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/pipe_created_win_exploit_redsun_named_pipe/</guid>
      <description>
        
          
            Detects the creation of a named pipe with the hardcoded name &#34;REDSUN&#34;.
The RedSun exploit tool uses a pipe with this name for synchronisation and command communication between its components during the Cloud Files API + oplock-based AV bypass and privilege escalation chain.
RedSun creates the pipe as \\??\pipe\REDSUN.
The pipe server listens for the token-duplicated elevated process to connect and respond, completing the privilege escalation from user to SYSTEM.
Presence of this pipe name indicates active or recent RedSun execution.

          
          
        
      </description>
    </item>
    
    <item>
      <title>RedSun - TieringEngineService.exe Detected as EICAR Test File</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/win_defender_exploit_redsun_tiering_engine_detected_as_eicar/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/win_defender_exploit_redsun_tiering_engine_detected_as_eicar/</guid>
      <description>
        
          
            Detects Windows Defender (EventID 1119 - Remediation Action Failed) flagging TieringEngineService.exe
dropped in a characteristic RS-{GUID} temporary directory, or the RedSun.exe process itself being present.
This covers the staging pattern used by RedSun, a Cloud Files API and opportunistic lock (oplock) based
AV bypass/privilege escalation tool.

RedSun works as follows:
  1. Registers a Cloud Files sync root and creates a Cloud Files placeholder for TieringEngineService.exe under %TEMP%\RS-{GUID}\
  2. The placeholder file carries EICAR test file content (Virus:DOS/EICAR_Test_File) to reliably trigger
     a Defender scan and remediation attempt
  3. Requests a batch oplock (FSCTL_REQUEST_BATCH_OPLOCK) on the placeholder file
  4. When Defender attempts to scan/quarantine the file, the oplock triggers - holding the file open
  5. During the oplock break window, RedSun swaps the mount point (junction) to redirect
     \\?\C:\Windows\System32 to the attacker-controlled temp path
  6. This races the AV/OS into executing the malicious TieringEngineService.exe with elevated privileges

          
          
        
      </description>
    </item>
    
    <item>
      <title>Reg Add Suspicious Paths</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_susp_paths/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_susp_paths/</guid>
      <description>
        
          
            Detects when an adversary uses the reg.exe utility to add or modify new keys or subkeys
          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry Entries For Azorult Malware</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_mal_azorult/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_mal_azorult/</guid>
      <description>
        
          
            Detects the presence of a registry key created during Azorult execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry Explorer Policy Modification</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_set_nopolicies_user/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_set_nopolicies_user/</guid>
      <description>
        
          
            Detects registry modifications that disable internal tools or functions in explorer (malware like Agent Tesla uses this technique)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry Hide Function from User</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_hide_function_user/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_hide_function_user/</guid>
      <description>
        
          
            Detects registry modifications that hide internal tools or functions from the user (malware like Agent Tesla, Hermetic Wiper uses this technique)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry Manipulation via WMI Stdregprov</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_stdregprov_reg_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_stdregprov_reg_modification/</guid>
      <description>
        
          
            Detects the usage of wmic.exe to manipulate Windows registry via the WMI StdRegProv class.
This behaviour could be potentially suspicious because it uses an alternative method to modify registry keys instead of legitimate registry tools like reg.exe or regedit.exe.
Attackers specifically choose this technique to evade detection and bypass security monitoring focused on traditional registry modification commands.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry Modification Attempt Via VBScript</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vbscript_registry_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vbscript_registry_modification/</guid>
      <description>
        
          
            Detects attempts to modify the registry using VBScript&#39;s CreateObject(&#34;Wscript.shell&#34;) and RegWrite methods via common LOLBINs.
It could be an attempt to modify the registry for persistence without using straightforward methods like regedit.exe, reg.exe, or PowerShell.
Threat Actors may use this technique to evade detection by security solutions that monitor for direct registry modifications through traditional tools.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry Modification Attempt Via VBScript - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_vbscript_registry_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_vbscript_registry_modification/</guid>
      <description>
        
          
            Detects attempts to modify the registry using VBScript&#39;s CreateObject(&#34;Wscript.shell&#34;) and RegWrite methods embedded within PowerShell scripts or commands.
Threat actors commonly embed VBScript code within PowerShell to perform registry modifications, attempting to evade detection that monitors for direct registry access through traditional tools.
This technique can be used for persistence, defense evasion, and privilege escalation by modifying registry keys without using regedit.exe, reg.exe, or PowerShell&#39;s native registry cmdlets.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry Modification for OCI DLL Redirection</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_potential_oci_dll_redirection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_potential_oci_dll_redirection/</guid>
      <description>
        
          
            Detects registry modifications related to &#39;OracleOciLib&#39; and &#39;OracleOciLibPath&#39; under &#39;MSDTC&#39; settings.
Threat actors may modify these registry keys to redirect the loading of &#39;oci.dll&#39; to a malicious DLL, facilitating phantom DLL hijacking via the MSDTC service.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry Modification of MS-settings Protocol Handler</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_registry_modification_of_ms_setting_protocol_handler/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_registry_modification_of_ms_setting_protocol_handler/</guid>
      <description>
        
          
            Detects registry modifications to the &#39;ms-settings&#39; protocol handler, which is frequently targeted for UAC bypass or persistence.
Attackers can modify this registry to execute malicious code with elevated privileges by hijacking the command execution path.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry Modification Via Regini.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regini_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regini_execution/</guid>
      <description>
        
          
            Detects the execution of regini.exe which can be used to modify registry keys, the changes are imported from one or more text files.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry Tampering by Potentially Suspicious Processes</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_susp_process_registry_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_susp_process_registry_modification/</guid>
      <description>
        
          
            Detects suspicious registry modifications made by suspicious processes such as script engine processes such as WScript, or CScript etc.
These processes are rarely used for legitimate registry modifications, and their activity may indicate an attempt to modify the registry
without using standard tools like regedit.exe or reg.exe, potentially for evasion and persistence.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote Registry Lateral Movement</title>
      <link>https://detection.fyi/sigmahq/sigma/application/rpc_firewall/rpc_firewall_remote_registry_lateral_movement/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/rpc_firewall/rpc_firewall_remote_registry_lateral_movement/</guid>
      <description>
        
          
            Detects remote RPC calls to modify the registry and possible execute code
          
          
        
      </description>
    </item>
    
    <item>
      <title>Removal Of AMSI Provider Registry Keys</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_removal_amsi_registry_key/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_removal_amsi_registry_key/</guid>
      <description>
        
          
            Detects the deletion of AMSI provider registry key entries in HKLM\Software\Microsoft\AMSI. This technique could be used by an attacker in order to disable AMSI inspection.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Removal Of Index Value to Hide Schedule Task - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_index_value_removal/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_index_value_removal/</guid>
      <description>
        
          
            Detects when the &#34;index&#34; value of a scheduled task is removed or deleted from the registry. Which effectively hides it from any tooling such as &#34;schtasks /query&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Removal of Potential COM Hijacking Registry Keys</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_removal_com_hijacking_registry_key/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_removal_com_hijacking_registry_key/</guid>
      <description>
        
          
            Detects any deletion of entries in &#34;.*\shell\open\command&#34; registry keys.
These registry keys might have been used for COM hijacking activities by a threat actor or an attacker and the deletion could indicate steps to remove its tracks.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Removal Of SD Value to Hide Schedule Task - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_sd_value_removal/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_sd_value_removal/</guid>
      <description>
        
          
            Remove SD (Security Descriptor) value in \Schedule\TaskCache\Tree registry hive to hide schedule task. This technique is used by Tarrask malware
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remove Immutable File Attribute</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_chattr_immutable_removal/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_chattr_immutable_removal/</guid>
      <description>
        
          
            Detects usage of the &#39;chattr&#39; utility to remove immutable file attribute.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remove Immutable File Attribute - Auditd</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_chattr_immutable_removal/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_chattr_immutable_removal/</guid>
      <description>
        
          
            Detects removing immutable file attribute.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed BOINC Client Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_boinc/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_boinc/</guid>
      <description>
        
          
            Detects the execution of a renamed BOINC binary.
          
          
        
      </description>
    </item>
    
    <item>
      <title>RestrictedAdminMode Registry Value Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_lsa_disablerestrictedadmin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_lsa_disablerestrictedadmin/</guid>
      <description>
        
          
            Detects changes to the &#34;DisableRestrictedAdmin&#34; registry value in order to disable or enable RestrictedAdmin mode.
RestrictedAdmin mode prevents the transmission of reusable credentials to the remote system to which you connect using Remote Desktop.
This prevents your credentials from being harvested during the initial connection process if the remote server has been compromise

          
          
        
      </description>
    </item>
    
    <item>
      <title>RestrictedAdminMode Registry Value Tampering - ProcCreation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_lsa_disable_restricted_admin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_lsa_disable_restricted_admin/</guid>
      <description>
        
          
            Detects changes to the &#34;DisableRestrictedAdmin&#34; registry value in order to disable or enable RestrictedAdmin mode.
RestrictedAdmin mode prevents the transmission of reusable credentials to the remote system to which you connect using Remote Desktop.
This prevents your credentials from being harvested during the initial connection process if the remote server has been compromise

          
          
        
      </description>
    </item>
    
    <item>
      <title>Root Certificate Installed - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_root_certificate_installed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_root_certificate_installed/</guid>
      <description>
        
          
            Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Root Certificate Installed From Susp Locations</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_import_cert_susp_locations/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_import_cert_susp_locations/</guid>
      <description>
        
          
            Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Run Once Task Configuration in Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_runonce_persistence/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_runonce_persistence/</guid>
      <description>
        
          
            Rule to detect the configuration of Run Once registry key. Configured payload can be run by runonce.exe /AlternateShellStartup
          
          
        
      </description>
    </item>
    
    <item>
      <title>Run Once Task Execution as Configured in Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_runonce_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_runonce_execution/</guid>
      <description>
        
          
            This rule detects the execution of Run Once task as configured in the registry
          
          
        
      </description>
    </item>
    
    <item>
      <title>SafeBoot Registry Key Deleted Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_delete_safeboot/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_delete_safeboot/</guid>
      <description>
        
          
            Detects execution of &#34;reg.exe&#34; commands with the &#34;delete&#34; flag on safe boot registry keys. Often used by attacker to prevent safeboot execution of security products
          
          
        
      </description>
    </item>
    
    <item>
      <title>ScreenConnect User Database Modification - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/exploits/cve-2024-1709/win_security_exploit_cve_2024_1709_user_database_modification_screenconnect/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/exploits/cve-2024-1709/win_security_exploit_cve_2024_1709_user_database_modification_screenconnect/</guid>
      <description>
        
          
            This detects file modifications to the temporary xml user database file indicating local user modification in the ScreenConnect server.
This will occur during exploitation of the ScreenConnect Authentication Bypass vulnerability (CVE-2024-1709) in versions &lt;23.9.8, but may also be observed when making legitimate modifications to local users or permissions.
This requires an Advanced Auditing policy to log a successful Windows Event ID 4663 events and with a SACL set on the directory.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Scripted Diagnostics Turn Off Check Enabled - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_enabling_turnoffcheck/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_enabling_turnoffcheck/</guid>
      <description>
        
          
            Detects enabling TurnOffCheck which can be used to bypass defense of MSDT Follina vulnerability
          
          
        
      </description>
    </item>
    
    <item>
      <title>Security Event Logging Disabled via MiniNt Registry Key - Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_event_logging_disable_via_key_minint/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_event_logging_disable_via_key_minint/</guid>
      <description>
        
          
            Detects attempts to disable security event logging by adding the `MiniNt` registry key.
This key is used to disable the Windows Event Log service, which collects and stores event logs from the operating system and applications.
Adversaries may want to disable this service to prevent logging of security events that could be used to detect their activities.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Security Event Logging Disabled via MiniNt Registry Key - Registry Set</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_create_minint_key/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_create_minint_key/</guid>
      <description>
        
          
            Detects the addition of the &#39;MiniNt&#39; key to the registry. Upon a reboot, Windows Event Log service will stop writing events.
Windows Event Log is a service that collects and stores event logs from the operating system and applications. It is an important component of Windows security and auditing.
Adversary may want to disable this service to disable logging of security events which could be used to detect their activities.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Security Eventlog Cleared</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_audit_log_cleared/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_audit_log_cleared/</guid>
      <description>
        
          
            One of the Windows Eventlogs has been cleared. e.g. caused by &#34;wevtutil cl&#34; command execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>Security Service Disabled Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_disable_sec_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_disable_sec_services/</guid>
      <description>
        
          
            Detects execution of &#34;reg.exe&#34; to disable security services such as Windows Defender.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Service Binary in Suspicious Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_creation_service_susp_folder/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_creation_service_susp_folder/</guid>
      <description>
        
          
            Detect the creation of a service with a service binary located in a suspicious directory
          
          
        
      </description>
    </item>
    
    <item>
      <title>Service Registry Key Deleted Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_delete_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_delete_services/</guid>
      <description>
        
          
            Detects execution of &#34;reg.exe&#34; commands with the &#34;delete&#34; flag on services registry key. Often used by attacker to remove AV software services
          
          
        
      </description>
    </item>
    
    <item>
      <title>Service Startup Type Change Via Wmic.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_service_startup_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_service_startup_change/</guid>
      <description>
        
          
            Detects changes to service startup type to &#39;disabled&#39; or &#39;manual&#39; using the WMIC command-line utility.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Service StartupType Change Via PowerShell Set-Service</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_set_service_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_set_service_disabled/</guid>
      <description>
        
          
            Detects the use of the PowerShell &#34;Set-Service&#34; cmdlet to change the startup type of a service to &#34;disabled&#34; or &#34;manual&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Service StartupType Change Via Sc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sc_disable_service/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sc_disable_service/</guid>
      <description>
        
          
            Detect the use of &#34;sc.exe&#34; to change the startup type of a service to &#34;disabled&#34; or &#34;demand&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>ShimCache Flush</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_susp_shimcache_flush/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_susp_shimcache_flush/</guid>
      <description>
        
          
            Detects actions that clear the local ShimCache and remove forensic evidence
          
          
        
      </description>
    </item>
    
    <item>
      <title>Startup/Logon Script Added to Group Policy Object</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_group_policy_startup_script_added_to_gpo/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_group_policy_startup_script_added_to_gpo/</guid>
      <description>
        
          
            Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Application Allowed Through Exploit Guard</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_exploit_guard_susp_allowed_apps/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_exploit_guard_susp_allowed_apps/</guid>
      <description>
        
          
            Detects applications being added to the &#34;allowed applications&#34; list of exploit guard in order to bypass controlled folder settings
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Eventlog Clear</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_clear_eventlog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_clear_eventlog/</guid>
      <description>
        
          
            Detects usage of known powershell cmdlets such as &#34;Clear-EventLog&#34; to clear the Windows event logs
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Eventlog Clearing or Configuration Change Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_eventlog_clear/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_eventlog_clear/</guid>
      <description>
        
          
            Detects the clearing or configuration tampering of EventLog using utilities such as &#34;wevtutil&#34;, &#34;powershell&#34; and &#34;wmic&#34;.
This technique were seen used by threat actors and ransomware strains in order to evade defenses.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Execution via macOS Script Editor</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_susp_execution_macos_script_editor/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_susp_execution_macos_script_editor/</guid>
      <description>
        
          
            Detects when the macOS Script Editor utility spawns an unusual child process.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Invoke-Item From Mount-DiskImage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_run_from_mount_diskimage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_run_from_mount_diskimage/</guid>
      <description>
        
          
            Adversaries may abuse container files such as disk image (.iso, .vhd) file formats to deliver malicious payloads that may not be tagged with MOTW.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Loading of Dbgcore/Dbghelp DLLs from Uncommon Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_win_susp_dbgcore_dbghelp_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_win_susp_dbgcore_dbghelp_load/</guid>
      <description>
        
          
            Detects loading of dbgcore.dll or dbghelp.dll from uncommon locations such as user directories.
These DLLs contain the MiniDumpWriteDump function, which can be abused for credential dumping purposes or in some cases for evading EDR/AV detection by suspending processes.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Mount-DiskImage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_mount_diskimage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_mount_diskimage/</guid>
      <description>
        
          
            Adversaries may abuse container files such as disk image (.iso, .vhd) file formats to deliver malicious payloads that may not be tagged with MOTW.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Package Installed - Linux</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_install_suspicious_packages/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_install_suspicious_packages/</guid>
      <description>
        
          
            Detects installation of suspicious packages using system installation utilities
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Path In Keyboard Layout IME File Registry Value</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_ime_suspicious_paths/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_ime_suspicious_paths/</guid>
      <description>
        
          
            Detects usage of Windows Input Method Editor (IME) keyboard layout feature, which allows an attacker to load a DLL into the process after sending the WM_INPUTLANGCHANGEREQUEST message.
Before doing this, the client needs to register the DLL in a special registry key that is assumed to implement this keyboard layout. This registry key should store a value named &#34;Ime File&#34; with a DLL path.
IMEs are essential for languages that have more characters than can be represented on a standard keyboard, such as Chinese, Japanese, and Korean.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Process Access of MsMpEng by WerFaultSecure - EDR-Freeze</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_werfaultsecure_msmpeng_access/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_werfaultsecure_msmpeng_access/</guid>
      <description>
        
          
            Detects process access events where WerFaultSecure accesses MsMpEng.exe with dbgcore.dll or dbghelp.dll in the call trace, indicating potential EDR freeze techniques.
This technique leverages WerFaultSecure.exe running as a Protected Process Light (PPL) with WinTCB protection level to call MiniDumpWriteDump and suspend EDR/AV processes, allowing malicious activity to execute undetected during the suspension period.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Process Access to LSASS with Dbgcore/Dbghelp DLLs</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_susp_dbgcore_dbghelp_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_susp_dbgcore_dbghelp_load/</guid>
      <description>
        
          
            Detects suspicious process access to LSASS.exe from processes located in uncommon locations with dbgcore.dll or dbghelp.dll in the call trace.
These DLLs contain functions like MiniDumpWriteDump that can be abused for credential dumping purposes. While modern tools like Mimikatz have moved to using ntdll.dll,
dbgcore.dll and dbghelp.dll are still used by basic credential dumping utilities and legacy tools for LSASS memory access and process suspension techniques.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious PROCEXP152.sys File Created In TMP</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_procexplorer_driver_created_in_tmp_folder/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_procexplorer_driver_created_in_tmp_folder/</guid>
      <description>
        
          
            Detects the creation of the PROCEXP152.sys file in the application-data local temporary folder.
This driver is used by Sysinternals Process Explorer but also by KDU (https://github.com/hfiref0x/KDU) or Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Program Location Whitelisted In Firewall Via Netsh.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_allow_program_in_susp_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_allow_program_in_susp_location/</guid>
      <description>
        
          
            Detects Netsh command execution that whitelists a program located in a suspicious location in the Windows Firewall
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious RazerInstaller Explorer Subprocess</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/razerinstaller-lpe-exploit/proc_creation_win_exploit_other_razorinstaller_lpe/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/razerinstaller-lpe-exploit/proc_creation_win_exploit_other_razorinstaller_lpe/</guid>
      <description>
        
          
            Detects a explorer.exe sub process of the RazerInstaller software which can be invoked from the installer to select a different installation folder but can also be exploited to escalate privileges to LOCAL SYSTEM
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Recursive Takeown</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_takeown_recursive_own/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_takeown_recursive_own/</guid>
      <description>
        
          
            Adversaries can interact with the DACLs using built-in Windows commands takeown which can grant adversaries higher permissions on specific files and folders
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Registry Modification From ADS Via Regini.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regini_ads/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regini_ads/</guid>
      <description>
        
          
            Detects the import of an alternate data stream with regini.exe, regini.exe can be used to modify registry keys.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Service Installed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_service_installed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_service_installed/</guid>
      <description>
        
          
            Detects installation of NalDrv or PROCEXP152 services via registry-keys to non-system32 folders.
Both services are used in the tool Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU (https://github.com/hfiref0x/KDU)

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Svchost Process Access</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_svchost_susp_access_request/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_svchost_susp_access_request/</guid>
      <description>
        
          
            Detects suspicious access to the &#34;svchost&#34; process such as that used by Invoke-Phantom to kill the thread of the Windows event logging service.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Unblock-File</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_unblock_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_unblock_file/</guid>
      <description>
        
          
            Remove the Zone.Identifier alternate data stream which identifies the file as downloaded from the internet.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Uninstall of Windows Defender Feature via PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_uninstall_defender_feature/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_uninstall_defender_feature/</guid>
      <description>
        
          
            Detects the use of PowerShell with Uninstall-WindowsFeature or Remove-WindowsFeature cmdlets to disable or remove the Windows Defender GUI feature, a common technique used by adversaries to evade defenses.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious VBoxDrvInst.exe Parameters</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_virtualbox_vboxdrvinst_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_virtualbox_vboxdrvinst_execution/</guid>
      <description>
        
          
            Detect VBoxDrvInst.exe run with parameters allowing processing INF file.
This allows to create values in the registry and install drivers.
For example one could use this technique to obtain persistence via modifying one of Run or RunOnce registry keys

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Windows Defender Folder Exclusion Added Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_defender_exclusion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_defender_exclusion/</guid>
      <description>
        
          
            Detects the usage of &#34;reg.exe&#34; to add Defender folder exclusions. Qbot has been seen using this technique to add exclusions for folders within AppData and ProgramData.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Windows Defender Registry Key Tampering Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_windows_defender_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_windows_defender_tamper/</guid>
      <description>
        
          
            Detects the usage of &#34;reg.exe&#34; to tamper with different Windows Defender registry keys in order to disable some important features related to protection and detection

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Windows Service Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_service_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_service_tamper/</guid>
      <description>
        
          
            Detects the usage of binaries such as &#39;net&#39;, &#39;sc&#39; or &#39;powershell&#39; in order to stop, pause, disable or delete critical or important Windows services such as AV, Backup, etc. As seen being used in some ransomware scripts

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Windows Trace ETW Session Tamper Via Logman.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_logman_disable_eventlog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_logman_disable_eventlog/</guid>
      <description>
        
          
            Detects the execution of &#34;logman&#34; utility in order to disable or delete Windows trace sessions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious X509Enrollment - Process Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_x509enrollment/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_x509enrollment/</guid>
      <description>
        
          
            Detect use of X509Enrollment
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious X509Enrollment - Ps Script</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_x509enrollment/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_x509enrollment/</guid>
      <description>
        
          
            Detect use of X509Enrollment
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysinternals PsSuspend Suspicious Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_pssuspend_susp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_pssuspend_susp_execution/</guid>
      <description>
        
          
            Detects suspicious execution of Sysinternals PsSuspend, where the utility is used to suspend critical processes such as AV or EDR to bypass defenses
          
          
        
      </description>
    </item>
    
    <item>
      <title>Syslog Clearing or Removal Via System Utilities</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_clear_syslog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_clear_syslog/</guid>
      <description>
        
          
            Detects specific commands commonly used to remove or empty the syslog. Which is a technique often used by attacker as a method to hide their tracks

          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Application Crashed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/application_popup/win_system_application_sysmon_crash/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/application_popup/win_system_application_sysmon_crash/</guid>
      <description>
        
          
            Detects application popup reporting a failure of the Sysmon service
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Blocked Executable</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_file_block_executable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_file_block_executable/</guid>
      <description>
        
          
            Triggers on any Sysmon &#34;FileBlockExecutable&#34; event, which indicates a violation of the configured block policy
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Blocked File Shredding</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_file_block_shredding/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_file_block_shredding/</guid>
      <description>
        
          
            Triggers on any Sysmon &#34;FileBlockShredding&#34; event, which indicates a violation of the configured shredding policy.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Channel Reference Deletion</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_sysmon_channel_reference_deletion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_sysmon_channel_reference_deletion/</guid>
      <description>
        
          
            Potential threat actor tampering with Sysmon manifest and eventually disabling it
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Configuration Change</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_config_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_config_modification/</guid>
      <description>
        
          
            Detects a Sysmon configuration change, which could be the result of a legitimate reconfiguration or someone trying manipulate the configuration
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Configuration Update</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_sysmon_config_update/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_sysmon_config_update/</guid>
      <description>
        
          
            Detects updates to Sysmon&#39;s configuration. Attackers might update or replace the Sysmon configuration with a bare bone one to avoid monitoring without shutting down the service completely
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Driver Altitude Change</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_change_sysmon_driver_altitude/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_change_sysmon_driver_altitude/</guid>
      <description>
        
          
            Detects changes in Sysmon driver altitude value.
If the Sysmon driver is configured to load at an altitude of another registered service, it will fail to load at boot.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Driver Unloaded Via Fltmc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver_sysmon/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver_sysmon/</guid>
      <description>
        
          
            Detects possible Sysmon filter driver unloaded via fltmc.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon File Executable Creation Detected</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_file_executable_detected/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_file_executable_detected/</guid>
      <description>
        
          
            Triggers on any Sysmon &#34;FileExecutableDetected&#34; event, which triggers every time a PE that is monitored by the config is created.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Tamper Windows Defender - PSClassic</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_classic/posh_pc_tamper_windows_defender_set_mp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_classic/posh_pc_tamper_windows_defender_set_mp/</guid>
      <description>
        
          
            Attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Tamper Windows Defender - ScriptBlockLogging</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_tamper_windows_defender_set_mp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_tamper_windows_defender_set_mp/</guid>
      <description>
        
          
            Detects PowerShell scripts attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Tamper Windows Defender Remove-MpPreference</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_remove_mppreference/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_remove_mppreference/</guid>
      <description>
        
          
            Detects attempts to remove Windows Defender configurations using the &#39;MpPreference&#39; cmdlet
          
          
        
      </description>
    </item>
    
    <item>
      <title>Tamper Windows Defender Remove-MpPreference - ScriptBlockLogging</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_tamper_windows_defender_rem_mp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_tamper_windows_defender_rem_mp/</guid>
      <description>
        
          
            Detects attempts to remove Windows Defender configuration using the &#39;MpPreference&#39; cmdlet
          
          
        
      </description>
    </item>
    
    <item>
      <title>Tamper With Sophos AV Registry Keys</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_sophos_av_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_sophos_av_tamper/</guid>
      <description>
        
          
            Detects tamper attempts to sophos av functionality via registry key modification
          
          
        
      </description>
    </item>
    
    <item>
      <title>Taskkill Symantec Endpoint Protection</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_taskkill_sep/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_taskkill_sep/</guid>
      <description>
        
          
            Detects one of the possible scenarios for disabling Symantec Endpoint Protection.
Symantec Endpoint Protection antivirus software services incorrectly implement the protected service mechanism.
As a result, the NT AUTHORITY/SYSTEM user can execute the taskkill /im command several times ccSvcHst.exe /f, thereby killing the process belonging to the service, and thus shutting down the service.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Terminal Server Client Connection History Cleared - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_mstsc_history_cleared/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_mstsc_history_cleared/</guid>
      <description>
        
          
            Detects the deletion of registry keys containing the MSTSC connection history
          
          
        
      </description>
    </item>
    
    <item>
      <title>The Windows Defender Firewall Service Failed To Load Group Policy</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_failed_load_gpo/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_failed_load_gpo/</guid>
      <description>
        
          
            Detects activity when The Windows Defender Firewall service failed to load Group Policy
          
          
        
      </description>
    </item>
    
    <item>
      <title>Trust Access Disable For VBApplications</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_access_vbom_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_access_vbom_tamper/</guid>
      <description>
        
          
            Detects registry changes to Microsoft Office &#34;AccessVBOM&#34; to a value of &#34;1&#34; which disables trust access for VBA on the victim machine and lets attackers execute malicious macros without any Microsoft Office warnings.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Ufw Force Stop Using Ufw-Init</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_disable_ufw/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_disable_ufw/</guid>
      <description>
        
          
            Detects attempts to force stop the ufw using ufw-init
          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Extension In Keyboard Layout IME File Registry Value</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_ime_non_default_extension/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_ime_non_default_extension/</guid>
      <description>
        
          
            Detects usage of Windows Input Method Editor (IME) keyboard layout feature, which allows an attacker to load a DLL into the process after sending the WM_INPUTLANGCHANGEREQUEST message.
Before doing this, the client needs to register the DLL in a special registry key that is assumed to implement this keyboard layout. This registry key should store a value named &#34;Ime File&#34; with a DLL path.
IMEs are essential for languages that have more characters than can be represented on a standard keyboard, such as Chinese, Japanese, and Korean.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Microsoft Office Trusted Location Added</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_trusted_location_uncommon/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_trusted_location_uncommon/</guid>
      <description>
        
          
            Detects changes to registry keys related to &#34;Trusted Location&#34; of Microsoft Office where the path is set to something uncommon. Attackers might add additional trusted locations to avoid macro security restrictions.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon New Firewall Rule Added In Windows Firewall Exception List</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_add_rule/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_add_rule/</guid>
      <description>
        
          
            Detects when a rule has been added to the Windows Firewall exception list
          
          
        
      </description>
    </item>
    
    <item>
      <title>Uninstall Crowdstrike Falcon Sensor</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_uninstall_crowdstrike_falcon/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_uninstall_crowdstrike_falcon/</guid>
      <description>
        
          
            Adversaries may disable security tools to avoid possible detection of their tools and activities by uninstalling Crowdstrike Falcon
          
          
        
      </description>
    </item>
    
    <item>
      <title>Uninstall Sysinternals Sysmon</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_sysmon_uninstall/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_sysmon_uninstall/</guid>
      <description>
        
          
            Detects the removal of Sysmon, which could be a potential attempt at defense evasion
          
          
        
      </description>
    </item>
    
    <item>
      <title>User Added To Group With CA Policy Modification Access</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_group_user_addition_ca_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_group_user_addition_ca_modification/</guid>
      <description>
        
          
            Monitor and alert on group membership additions of groups that have CA policy modification access
          
          
        
      </description>
    </item>
    
    <item>
      <title>User Removed From Group With CA Policy Modification Access</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_group_user_removal_ca_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_group_user_removal_ca_modification/</guid>
      <description>
        
          
            Monitor and alert on group membership removal of groups that have CA policy modification access
          
          
        
      </description>
    </item>
    
    <item>
      <title>User Shell Folders Registry Modification via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_user_shell_folders_registry_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_user_shell_folders_registry_modification/</guid>
      <description>
        
          
            Detects modifications to User Shell Folders registry values via reg.exe or PowerShell, which could indicate persistence attempts.
Attackers may modify User Shell Folders registry values to point to malicious executables or scripts that will be executed during startup.
This technique is often used to maintain persistence on a compromised system by ensuring that malicious payloads are executed automatically.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Vulnerable Driver Blocklist Registry Tampering Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vulnerable_driver_blocklist_registry_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vulnerable_driver_blocklist_registry_tampering/</guid>
      <description>
        
          
            Detects tampering of the Vulnerable Driver Blocklist registry via command line tools such as PowerShell or REG.EXE.
The Vulnerable Driver Blocklist is a security feature that helps prevent the loading of known vulnerable drivers.
Disabling this feature may indicate an attempt to bypass security controls, often targeted by threat actors
to facilitate the installation of malicious or vulnerable drivers, particularly in scenarios involving Endpoint Detection and Response

          
          
        
      </description>
    </item>
    
    <item>
      <title>WannaCry Ransomware Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/wannacry/proc_creation_win_malware_wannacry/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/wannacry/proc_creation_win_malware_wannacry/</guid>
      <description>
        
          
            Detects WannaCry ransomware activity
          
          
        
      </description>
    </item>
    
    <item>
      <title>Wdigest CredGuard Registry Modification</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_disable_wdigest_credential_guard/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_disable_wdigest_credential_guard/</guid>
      <description>
        
          
            Detects potential malicious modification of the property value of IsCredGuardEnabled from
HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest to disable Cred Guard on a system.
This is usually used with UseLogonCredential to manipulate the caching credentials.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Wdigest Enable UseLogonCredential</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_wdigest_enable_uselogoncredential/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_wdigest_enable_uselogoncredential/</guid>
      <description>
        
          
            Detects potential malicious modification of the property value of UseLogonCredential from HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest to enable clear-text credentials
          
          
        
      </description>
    </item>
    
    <item>
      <title>Weak Encryption Enabled and Kerberoast</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_alert_enable_weak_encryption/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_alert_enable_weak_encryption/</guid>
      <description>
        
          
            Detects scenario where weak encryption is enabled for a user profile which could be used for hash/password cracking.
          
          
        
      </description>
    </item>
    
    <item>
      <title>WFP Filter Added via Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_wfp_filter_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_wfp_filter_added/</guid>
      <description>
        
          
            Detects registry modifications that add Windows Filtering Platform (WFP) filters, which may be used to block security tools and EDR agents from reporting events.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Win Defender Restored Quarantine File</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_restored_quarantine_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_restored_quarantine_file/</guid>
      <description>
        
          
            Detects the restoration of files from the defender quarantine
          
          
        
      </description>
    </item>
    
    <item>
      <title>WinDivert Driver Load</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/driver_load/driver_load_win_windivert/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/driver_load/driver_load_win_windivert/</guid>
      <description>
        
          
            Detects the load of the Windiver driver, a powerful user-mode capture/sniffing/modification/blocking/re-injection package for Windows
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows AMSI Related Registry Tampering Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_amsi_registry_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_amsi_registry_tampering/</guid>
      <description>
        
          
            Detects tampering of AMSI (Anti-Malware Scan Interface) related registry values via command line tools such as reg.exe or PowerShell.
AMSI provides a generic interface for applications and services to integrate with antimalware products.
Adversaries may disable AMSI to evade detection of malicious scripts and code execution.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows AppX Deployment Full Trust Package Installation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxpackaging_server_full_trust_package_installation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxpackaging_server_full_trust_package_installation/</guid>
      <description>
        
          
            Detects the installation of MSIX/AppX packages with full trust privileges which run with elevated privileges outside normal AppX container restrictions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows AppX Deployment Unsigned Package Installation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxpackaging_server_unsigned_package_installation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxpackaging_server_unsigned_package_installation/</guid>
      <description>
        
          
            Detects attempts to install unsigned MSIX/AppX packages using the -AllowUnsigned parameter via AppXDeployment-Server events
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Credential Guard Disabled - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_credential_guard_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_credential_guard_disabled/</guid>
      <description>
        
          
            Detects attempts to disable Windows Credential Guard by setting registry values to 0. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
Adversaries may disable Credential Guard to gain access to sensitive credentials stored in the system, such as NTLM hashes and Kerberos tickets, which can be used for lateral movement and privilege escalation.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Credential Guard Registry Tampering Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_credential_guard_registry_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_credential_guard_registry_tampering/</guid>
      <description>
        
          
            Detects attempts to add, modify, or delete Windows Credential Guard related registry keys or values via command line tools such as Reg.exe or PowerShell.
Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
Adversaries may disable Credential Guard to gain access to sensitive credentials stored in the system, such as NTLM hashes and Kerberos tickets, which can be used for lateral movement and privilege escalation.
The rule matches suspicious command lines that target DeviceGuard or LSA registry paths and manipulate keys like EnableVirtualizationBasedSecurity, RequirePlatformSecurityFeatures, or LsaCfgFlags.
Such activity may indicate an attempt to disable or tamper with Credential Guard, potentially exposing sensitive credentials for misuse.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Credential Guard Related Registry Value Deleted - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_disable_credential_guard/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_disable_credential_guard/</guid>
      <description>
        
          
            Detects attempts to disable Windows Credential Guard by deleting registry values. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
Adversaries may disable Credential Guard to gain access to sensitive credentials stored in the system, such as NTLM hashes and Kerberos tickets, which can be used for lateral movement and privilege escalation.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Default Domain GPO Modification</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_default_domain_gpo_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_default_domain_gpo_modification/</guid>
      <description>
        
          
            Detects modifications to Default Domain or Default Domain Controllers Group Policy Objects (GPOs).
Adversaries may modify these default GPOs to deploy malicious configurations across the domain.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Default Domain GPO Modification via GPME</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mmc_default_domain_gpo_modification_via_gpme/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mmc_default_domain_gpo_modification_via_gpme/</guid>
      <description>
        
          
            Detects the use of the Group Policy Management Editor (GPME) to modify Default Domain or Default Domain Controllers Group Policy Objects (GPOs).
Adversaries may leverage GPME to make stealthy changes in these default GPOs to deploy malicious GPOs configurations across the domain without raising suspicion.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Configuration Changes</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_suspicious_features_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_suspicious_features_tampering/</guid>
      <description>
        
          
            Detects suspicious changes to the Windows Defender configuration
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Context Menu Removed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_defender_remove_context_menu/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_defender_remove_context_menu/</guid>
      <description>
        
          
            Detects the use of reg.exe or PowerShell to delete the Windows Defender context menu handler registry keys.
This action removes the &#34;Scan with Microsoft Defender&#34; option from the right-click menu for files, directories, and drives.
Attackers may use this technique to hinder manual, on-demand scans and reduce the visibility of the security product.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Definition Files Removed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mpcmdrun_remove_windows_defender_definition/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mpcmdrun_remove_windows_defender_definition/</guid>
      <description>
        
          
            Adversaries may disable security tools to avoid possible detection of their tools and activities by removing Windows Defender Definition Files
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Exclusion List Modified</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_windows_defender_exclusions_registry_modified/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_windows_defender_exclusions_registry_modified/</guid>
      <description>
        
          
            Detects modifications to the Windows Defender exclusion registry key. This could indicate a potentially suspicious or even malicious activity by an attacker trying to add a new exclusion in order to bypass security.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Exclusion Registry Key - Write Access Requested</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_windows_defender_exclusions_write_access/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_windows_defender_exclusions_write_access/</guid>
      <description>
        
          
            Detects write access requests to the Windows Defender exclusions registry keys. This could be an indication of an attacker trying to request a handle or access the object to write new exclusions in order to bypass security.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Exclusions Added</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_config_change_exclusion_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_config_change_exclusion_added/</guid>
      <description>
        
          
            Detects the Setting of Windows Defender Exclusions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Exclusions Added - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_win_defender_exclusions_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_win_defender_exclusions_added/</guid>
      <description>
        
          
            Detects modifications to the Windows Defender configuration settings using PowerShell to add exclusions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Exclusions Added - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_defender_exclusions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_defender_exclusions/</guid>
      <description>
        
          
            Detects the Setting of Windows Defender Exclusions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Exploit Guard Tamper</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_config_change_exploit_guard_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_config_change_exploit_guard_tamper/</guid>
      <description>
        
          
            Detects when someone is adding or removing applications or folders from exploit guard &#34;ProtectedFolders&#34; or &#34;AllowedApplications&#34;

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Firewall Has Been Reset To Its Default Configuration</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_reset_config/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_reset_config/</guid>
      <description>
        
          
            Detects activity when Windows Defender Firewall has been reset to its default configuration
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Grace Period Expired</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_antimalware_platform_expired/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_antimalware_platform_expired/</guid>
      <description>
        
          
            Detects the expiration of the grace period of Windows Defender. This means protection against viruses, spyware, and other potentially unwanted software is disabled.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Malware And PUA Scanning Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_malware_and_pua_scan_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_malware_and_pua_scan_disabled/</guid>
      <description>
        
          
            Detects disabling of the Windows Defender feature of scanning for malware and other potentially unwanted software
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Malware Detection History Deletion</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_history_delete/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_history_delete/</guid>
      <description>
        
          
            Windows Defender logs when the history of detected infections is deleted.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Real-time Protection Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_real_time_protection_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_real_time_protection_disabled/</guid>
      <description>
        
          
            Detects disabling of Windows Defender Real-time Protection. As this event doesn&#39;t contain a lot of information on who initiated this action you might want to reduce it to a &#34;medium&#34; level if this occurs too many times in your environment

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Real-Time Protection Failure/Restart</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_real_time_protection_errors/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_real_time_protection_errors/</guid>
      <description>
        
          
            Detects issues with Windows Defender Real-Time Protection features
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Service Disabled - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_windows_defender_service/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_windows_defender_service/</guid>
      <description>
        
          
            Detects when an attacker or tool disables the  Windows Defender service (WinDefend) via the registry
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Submit Sample Feature Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_config_change_sample_submission_consent/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_config_change_sample_submission_consent/</guid>
      <description>
        
          
            Detects disabling of the &#34;Automatic Sample Submission&#34; feature of Windows Defender.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Threat Detection Service Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_defender_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_defender_disabled/</guid>
      <description>
        
          
            Detects when the &#34;Windows Defender Threat Protection&#34; service is disabled.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Threat Severity Default Action Modified</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_defender_threat_action_modified/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_defender_threat_action_modified/</guid>
      <description>
        
          
            Detects modifications or creations of Windows Defender&#39;s default threat action settings based on severity to &#39;allow&#39; or take &#39;no action&#39;.
This is a highly suspicious configuration change that effectively disables Defender&#39;s ability to automatically mitigate threats of a certain severity level,
allowing malicious software to run unimpeded. An attacker might use this technique to bypass defenses before executing payloads.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Virus Scanning Feature Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_virus_scan_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_virus_scan_disabled/</guid>
      <description>
        
          
            Detects disabling of the Windows Defender virus scanning feature
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Event Auditing Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_disable_event_auditing/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_disable_event_auditing/</guid>
      <description>
        
          
            Detects scenarios where system auditing (i.e.: Windows event log auditing) is disabled.
This may be used in a scenario where an entity would want to bypass local logging to evade detection when Windows event logging is enabled and reviewed.
Also, it is recommended to turn off &#34;Local Group Policy Object Processing&#34; via GPO, which will make sure that Active Directory GPOs take precedence over local/edited computer policies via something such as &#34;gpedit.msc&#34;.
Please note, that disabling &#34;Local Group Policy Object Processing&#34; may cause an issue in scenarios of one off specific GPO modifications - however, it is recommended to perform these modifications in Active Directory anyways.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Event Log Access Tampering Via Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_windows_event_log_access/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_windows_event_log_access/</guid>
      <description>
        
          
            Detects changes to the Windows EventLog channel permission values. It focuses on changes to the Security Descriptor Definition Language (SDDL) string, as modifications to these values can restrict access to specific users or groups, potentially aiding in defense evasion by controlling who can view or modify a event log channel. Upon execution, the user shouldn&#39;t be able to access the event log channel via the event viewer or via utilities such as &#34;Get-EventLog&#34; or &#34;wevtutil&#34;.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows EventLog Autologger Session Registry Modification Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_autologger_session_registry_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_autologger_session_registry_modification/</guid>
      <description>
        
          
            Detects attempts to disable Windows EventLog autologger sessions via registry modification.
The AutoLogger event tracing session records events that occur early in the operating system boot process.
Applications and device drivers can use the AutoLogger session to capture traces before the user logs in.
Adversaries may disable these sessions to evade detection and prevent security monitoring of early boot activities and system events.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Filtering Platform Blocked Connection From EDR Agent Binary</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/object_access/win_security_wfp_endpoint_agent_blocked/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/object_access/win_security_wfp_endpoint_agent_blocked/</guid>
      <description>
        
          
            Detects a Windows Filtering Platform (WFP) blocked connection event involving common Endpoint Detection and Response (EDR) agents.
Adversaries may use WFP filters to prevent Endpoint Detection and Response (EDR) agents from reporting security events.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Firewall Disabled via PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_disable_firewall/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_disable_firewall/</guid>
      <description>
        
          
            Detects attempts to disable the Windows Firewall using PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Firewall Profile Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_windows_firewall_profile_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_windows_firewall_profile_disabled/</guid>
      <description>
        
          
            Detects when a user disables the Windows Firewall via a Profile to help evade defense.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Firewall Settings Have Been Changed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_setting_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_setting_change/</guid>
      <description>
        
          
            Detects activity when the settings of the Windows firewall have been changed
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Hypervisor Enforced Code Integrity Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_deviceguard_hypervisorenforcedcodeintegrity_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_deviceguard_hypervisorenforcedcodeintegrity_disabled/</guid>
      <description>
        
          
            Detects changes to the HypervisorEnforcedCodeIntegrity registry key and the &#34;Enabled&#34; value being set to 0 in order to disable the Hypervisor Enforced Code Integrity feature. This allows an attacker to load unsigned and untrusted code to be run in the kernel

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows MSIX Package Support Framework AI_STUBS Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msix_ai_stub_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msix_ai_stub_execution/</guid>
      <description>
        
          
            Detects execution of Advanced Installer MSIX Package Support Framework (PSF) components, specifically AI_STUBS executables with original filename &#39;popupwrapper.exe&#39;.
This activity may indicate malicious MSIX packages build with Advanced Installer leveraging the Package Support Framework to bypass application control restrictions.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Vulnerable Driver Blocklist Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_vulnerable_driver_blocklist_disable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_vulnerable_driver_blocklist_disable/</guid>
      <description>
        
          
            Detects when the Windows Vulnerable Driver Blocklist is set to disabled. This setting is crucial for preventing the loading of known vulnerable drivers,
and its modification may indicate an attempt to bypass security controls. It is often targeted by threat actors to facilitate the installation of malicious or vulnerable drivers,
particularly in scenarios involving Endpoint Detection and Response (EDR) bypass techniques.
This rule applies to systems that support the Vulnerable Driver Blocklist feature, including Windows 10 version 1903 and later, and Windows Server 2022 and later.
Note that this change will require a reboot to take effect, and this rule only detects the registry modification action.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Winget Admin Settings Modification</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_winget_admin_settings_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_winget_admin_settings_tampering/</guid>
      <description>
        
          
            Detects changes to the AppInstaller (winget) admin settings. Such as enabling local manifest installations or disabling installer hash checks
          
          
        
      </description>
    </item>
    
    <item>
      <title>Winlogon AllowMultipleTSSessions Enable</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_winlogon_allow_multiple_tssessions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_winlogon_allow_multiple_tssessions/</guid>
      <description>
        
          
            Detects when the &#39;AllowMultipleTSSessions&#39; value is enabled.
Which allows for multiple Remote Desktop connection sessions to be opened at once.
This is often used by attacker as a way to connect to an RDP session without disconnecting the other users

          
          
        
      </description>
    </item>
    
    <item>
      <title>Write Protect For Storage Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_write_protect_for_storage_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_write_protect_for_storage_disabled/</guid>
      <description>
        
          
            Detects applications trying to modify the registry in order to disable any write-protect property for storage devices.
This could be a precursor to a ransomware attack and has been an observed technique used by cypherpunk group.

          
          
        
      </description>
    </item>
    
  </channel>
</rss>
