<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>attack.t1685 on Detection.FYI</title>
    <link>https://detection.fyi/tags/attack.t1685/</link>
    <description>Recent content in attack.t1685 on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Tue, 28 Apr 2026 23:20:23 +0000</lastBuildDate><atom:link href="https://detection.fyi/tags/attack.t1685/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Add SafeBoot Keys Via Reg Utility</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_add_safeboot/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_add_safeboot/</guid>
      <description>
        
          
            Detects execution of &#34;reg.exe&#34; commands with the &#34;add&#34; or &#34;copy&#34; flags on safe boot registry keys. Often used by attacker to allow the ransomware to work in safe mode as some security products do not
          
          
        
      </description>
    </item>
    
    <item>
      <title>AMSI Bypass Pattern Assembly GetType</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_amsi_bypass_pattern_nov22/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_amsi_bypass_pattern_nov22/</guid>
      <description>
        
          
            Detects code fragments found in small and obfuscated AMSI bypass PowerShell scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>AMSI Disabled via Registry Modification</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_amsi_disable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_amsi_disable/</guid>
      <description>
        
          
            Detects attempts to disable AMSI (Anti-Malware Scan Interface) by modifying the AmsiEnable registry value.
Anti-Malware Scan Interface (AMSI) is a security feature in Windows that allows applications and services to integrate with anti-malware products for enhanced protection against malicious content.
Adversaries may attempt to disable AMSI to evade detection by security software, allowing them to execute malicious scripts or code without being scanned.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Antivirus Filter Driver Disallowed On Dev Drive - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_devdrv_disallow_antivirus_filter/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_devdrv_disallow_antivirus_filter/</guid>
      <description>
        
          
            Detects activity that indicates a user disabling the ability for Antivirus mini filter to inspect a &#34;Dev Drive&#34;.

          
          
        
      </description>
    </item>
    
    <item>
      <title>ASLR Disabled Via Sysctl or Direct Syscall - Linux</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/lnx_auditd_disable_aslr_protection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/lnx_auditd_disable_aslr_protection/</guid>
      <description>
        
          
            Detects actions that disable Address Space Layout Randomization (ASLR) in Linux, including:
  - Use of the `personality` syscall with the ADDR_NO_RANDOMIZE flag (0x0040000)
  - Modification of the /proc/sys/kernel/randomize_va_space file
  - Execution of the `sysctl` command to set `kernel.randomize_va_space=0`
Disabling ASLR is often used by attackers during exploit development or to bypass memory protection mechanisms.
A successful use of these methods can reduce the effectiveness of ASLR and make memory corruption attacks more reliable.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Auditing Configuration Changes on Linux Host</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/path/lnx_auditd_auditing_config_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/path/lnx_auditd_auditing_config_change/</guid>
      <description>
        
          
            Detect changes in auditd configuration files
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS GuardDuty Detector Deleted Or Updated</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_guardduty_detector_deleted_or_updated/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_guardduty_detector_deleted_or_updated/</guid>
      <description>
        
          
            Detects successful deletion or disabling of an AWS GuardDuty detector, possibly by an attacker trying to avoid detection of its malicious activities.
Upon deletion, GuardDuty stops monitoring the environment and all existing findings are lost.
Verify with the user identity that this activity is legitimate.

          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS GuardDuty Important Change</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_guardduty_disruption/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_guardduty_disruption/</guid>
      <description>
        
          
            Detects updates of the GuardDuty list of trusted IPs, perhaps to disable security alerts against malicious IPs.
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS SecurityHub Findings Evasion</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_securityhub_finding_evasion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_securityhub_finding_evasion/</guid>
      <description>
        
          
            Detects the modification of the findings on SecurityHub.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Kubernetes Events Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_kubernetes_events_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_kubernetes_events_deleted/</guid>
      <description>
        
          
            Detects when Events are deleted in Azure Kubernetes. An adversary may delete events in Azure Kubernetes in an attempt to evade detection.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket Audit Log Configuration Updated</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_log_configuration_update_detected/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_log_configuration_update_detected/</guid>
      <description>
        
          
            Detects changes to the bitbucket audit log configuration.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket Global Secret Scanning Rule Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_global_secret_scanning_rule_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_global_secret_scanning_rule_deleted/</guid>
      <description>
        
          
            Detects Bitbucket global secret scanning rule deletion activity.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket Global SSH Settings Changed</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_global_ssh_settings_change_detected/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_global_ssh_settings_change_detected/</guid>
      <description>
        
          
            Detects Bitbucket global SSH access configuration changes.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket Project Secret Scanning Allowlist Added</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_project_secret_scanning_allowlist_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_project_secret_scanning_allowlist_added/</guid>
      <description>
        
          
            Detects when a secret scanning allowlist rule is added for projects.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket Secret Scanning Exempt Repository Added</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_secret_scanning_exempt_repository_detected/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_secret_scanning_exempt_repository_detected/</guid>
      <description>
        
          
            Detects when a repository is exempted from secret scanning feature.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket Secret Scanning Rule Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_secret_scanning_rule_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_secret_scanning_rule_deleted/</guid>
      <description>
        
          
            Detects when secret scanning rule is deleted for the project or repository.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Cisco Disabling Logging</title>
      <link>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_disable_logging/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_disable_logging/</guid>
      <description>
        
          
            Turn off logging locally or remote
          
          
        
      </description>
    </item>
    
    <item>
      <title>Cisco Dot1x Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_dot1x_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_dot1x_disabled/</guid>
      <description>
        
          
            Detects the manual disablement of IEEE 802.1X (dot1x) on a Cisco network device interface.
Disabling dot1x bypasses Network Access Control (NAC) mechanisms, potentially allowing unauthorized devices to gain access to the internal network.
This activity is a common technique used by attackers or malicious insiders to establish persistence or perform lateral movement via rogue devices.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Devcon Execution Disabling VMware VMCI Device</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_devcon_disable_vmci_driver/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_devcon_disable_vmci_driver/</guid>
      <description>
        
          
            Detects execution of devcon.exe with commands that disable the VMware Virtual Machine Communication Interface (VMCI) device.
This can be legitimate during VMware Tools troubleshooting or driver conflicts, but may also indicate malware attempting to hijack communication with the hardware via the VMCI device.
This has been used to facilitate VMware ESXi vulnerability exploits to escape VMs and execute code on the ESXi host.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Diamond Sleet APT Scheduled Task Creation - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/diamond-sleet/registry_event_apt_diamond_sleet_scheduled_task/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/diamond-sleet/registry_event_apt_diamond_sleet_scheduled_task/</guid>
      <description>
        
          
            Detects registry event related to the creation of a scheduled task used by Diamond Sleet APT during exploitation of Team City CVE-2023-42793 vulnerability

          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Exploit Guard Network Protection on Windows Defender</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_exploit_guard_net_protection_on_ms_defender/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_exploit_guard_net_protection_on_ms_defender/</guid>
      <description>
        
          
            Detects disabling Windows Defender Exploit Guard Network Protection
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable of ETW Trace - Powershell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_etw_trace_evasion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_etw_trace_evasion/</guid>
      <description>
        
          
            Detects usage of powershell cmdlets to disable or remove ETW trace sessions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Or Stop Services</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_services_stop_and_disable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_services_stop_and_disable/</guid>
      <description>
        
          
            Detects the usage of utilities such as &#39;systemctl&#39;, &#39;service&#39;...etc to stop or disable tools and services on Linux systems.
Attackers may stop or disable security tools and services to evade detection, maintain persistence, or disrupt system operations.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Privacy Settings Experience in Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_privacy_settings_experience/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_privacy_settings_experience/</guid>
      <description>
        
          
            Detects registry modifications that disable Privacy Settings Experience
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable PUA Protection on Windows Defender</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_pua_protection_on_microsoft_defender/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_pua_protection_on_microsoft_defender/</guid>
      <description>
        
          
            Detects disabling Windows Defender PUA protection
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Security Tools</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_disable_security_tools/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_disable_security_tools/</guid>
      <description>
        
          
            Detects disabling security tools
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Tamper Protection on Windows Defender</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_tamper_protection_on_microsoft_defender/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_tamper_protection_on_microsoft_defender/</guid>
      <description>
        
          
            Detects disabling Windows Defender Tamper Protection
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Windows Defender AV Security Monitoring</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_disable_defender_av_security_monitoring/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_disable_defender_av_security_monitoring/</guid>
      <description>
        
          
            Detects attackers attempting to disable Windows Defender using Powershell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Windows Defender Functionalities Via Registry Keys</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_windows_defender_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_windows_defender_tamper/</guid>
      <description>
        
          
            Detects when attackers or tools disable Windows Defender functionalities via the Windows registry
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable-WindowsOptionalFeature Command PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_disable_windows_optional_feature/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_disable_windows_optional_feature/</guid>
      <description>
        
          
            Detect built in PowerShell cmdlet Disable-WindowsOptionalFeature, Deployment Image Servicing and Management tool.
Similar to DISM.exe, this cmdlet is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabled IE Security Features</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_disable_ie_features/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_disable_ie_features/</guid>
      <description>
        
          
            Detects command lines that indicate unwanted modifications to registry keys that disable important Internet Explorer security features
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabled Volume Snapshots</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_volsnap_disable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_volsnap_disable/</guid>
      <description>
        
          
            Detects commands that temporarily turn off Volume Snapshots
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabled Windows Defender Eventlog</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_microsoft_defender_eventlog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disabled_microsoft_defender_eventlog/</guid>
      <description>
        
          
            Detects the disabling of the Windows Defender eventlog as seen in relation to Lockbit 3.0 infections
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabling Windows Defender WMI Autologger Session via Reg.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_disable_defender_wmi_autologger/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_disable_defender_wmi_autologger/</guid>
      <description>
        
          
            Detects the use of reg.exe to disable the Event Tracing for Windows (ETW) Autologger session for Windows Defender API and Audit events.
By setting the &#39;Start&#39; value to &#39;0&#39; for the &#39;DefenderApiLogger&#39; or &#39;DefenderAuditLogger&#39; session, an attacker can prevent these critical security events
from being logged, effectively blinding monitoring tools that rely on this data. This is a powerful defense evasion technique.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Dism Remove Online Package</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dism_remove/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dism_remove/</guid>
      <description>
        
          
            Deployment Image Servicing and Management tool. DISM is used to enumerate, install, uninstall, configure, and update features and packages in Windows images
          
          
        
      </description>
    </item>
    
    <item>
      <title>Enable Remote Connection Between Anonymous Computer - AllowAnonymousCallback</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_set_enable_anonymous_connection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_set_enable_anonymous_connection/</guid>
      <description>
        
          
            Detects enabling of the &#34;AllowAnonymousCallback&#34; registry value, which allows a remote connection between computers that do not have a trust relationship.
          
          
        
      </description>
    </item>
    
    <item>
      <title>ESXi Syslog Configuration Change Via ESXCLI</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_esxcli_syslog_config_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_esxcli_syslog_config_change/</guid>
      <description>
        
          
            Detects changes to the ESXi syslog configuration via &#34;esxcli&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Logging Disabled For rpcrt4.dll</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_rpcrt4_etw_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_rpcrt4_etw_tamper/</guid>
      <description>
        
          
            Detects changes to the &#34;ExtErrorInformation&#34; key in order to disable ETW logging for rpcrt4.dll
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Logging Disabled For SCM</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_services_etw_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_services_etw_tamper/</guid>
      <description>
        
          
            Detects changes to the &#34;TracingDisabled&#34; key in order to disable ETW logging for services.exe (SCM)
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Logging Disabled In .NET Processes - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_dot_net_etw_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_dot_net_etw_tamper/</guid>
      <description>
        
          
            Potential adversaries stopping ETW providers recording loaded .NET assemblies.
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Logging Disabled In .NET Processes - Sysmon Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dot_net_etw_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dot_net_etw_tamper/</guid>
      <description>
        
          
            Potential adversaries stopping ETW providers recording loaded .NET assemblies.
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Logging Tamper In .NET Processes Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_etw_modification_cmdline/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_etw_modification_cmdline/</guid>
      <description>
        
          
            Detects changes to environment variables related to ETW logging via the CommandLine.
This could indicate potential adversaries stopping ETW providers recording loaded .NET assemblies.

          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Trace Evasion Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_etw_trace_evasion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_etw_trace_evasion/</guid>
      <description>
        
          
            Detects command line activity that tries to clear or disable any ETW trace log which could be a sign of logging evasion.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Filter Driver Unloaded Via Fltmc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver/</guid>
      <description>
        
          
            Detect filter driver unloading activity via fltmc.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Folder Removed From Exploit Guard ProtectedFolders List - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_exploit_guard_protected_folders/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_exploit_guard_protected_folders/</guid>
      <description>
        
          
            Detects the removal of folders from the &#34;ProtectedFolders&#34; list of of exploit guard. This could indicate an attacker trying to launch an encryption process or trying to manipulate data inside of the protected folder
          
          
        
      </description>
    </item>
    
    <item>
      <title>FortiGate - Firewall Address Object Added</title>
      <link>https://detection.fyi/sigmahq/sigma/network/fortinet/fortigate/fortinet_fortigate_new_firewall_address_object/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/fortinet/fortigate/fortinet_fortigate_new_firewall_address_object/</guid>
      <description>
        
          
            Detects the addition of firewall address objects on a Fortinet FortiGate Firewall.
          
          
        
      </description>
    </item>
    
    <item>
      <title>FortiGate - New Firewall Policy Added</title>
      <link>https://detection.fyi/sigmahq/sigma/network/fortinet/fortigate/fortinet_fortigate_new_firewall_policy_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/fortinet/fortigate/fortinet_fortigate_new_firewall_policy_added/</guid>
      <description>
        
          
            Detects the addition of a new firewall policy on a Fortinet FortiGate Firewall.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Github Push Protection Bypass Detected</title>
      <link>https://detection.fyi/sigmahq/sigma/application/github/audit/github_push_protection_bypass_detected/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/github/audit/github_push_protection_bypass_detected/</guid>
      <description>
        
          
            Detects when a user bypasses the push protection on a secret detected by secret scanning.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Github Push Protection Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/application/github/audit/github_push_protection_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/github/audit/github_push_protection_disabled/</guid>
      <description>
        
          
            Detects if the push protection feature is disabled for an organization, enterprise, repositories or custom pattern rules.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Github Secret Scanning Feature Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/application/github/audit/github_secret_scanning_feature_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/github/audit/github_secret_scanning_feature_disabled/</guid>
      <description>
        
          
            Detects if the secret scanning feature is disabled for an enterprise or repository.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Google Cloud Firewall Modified or Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/gcp/audit/gcp_firewall_rule_modified_or_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/gcp/audit/gcp_firewall_rule_modified_or_deleted/</guid>
      <description>
        
          
            Detects  when a firewall rule is modified or deleted in Google Cloud Platform (GCP).
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - CobaltStrike BOF Injection Pattern</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_hktl_cobaltstrike_bof_injection_pattern/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_hktl_cobaltstrike_bof_injection_pattern/</guid>
      <description>
        
          
            Detects a typical pattern of a CobaltStrike BOF which inject into other processes
          
          
        
      </description>
    </item>
    
    <item>
      <title>Hacktool - EDR-Freeze Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_edr_freeze/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_edr_freeze/</guid>
      <description>
        
          
            Detects execution of EDR-Freeze, a tool that exploits the MiniDumpWriteDump function and WerFaultSecure.exe to suspend EDR and Antivirus processes on Windows.
EDR-Freeze leverages a race-condition attack to put security processes into a dormant state by suspending WerFaultSecure at the moment it freezes the target process.
This technique does not require kernel-level exploits or BYOVD, but instead abuses user-mode functionality to temporarily disable monitoring by EDR or Antimalware solutions.

          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - EDRSilencer Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_edrsilencer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_edrsilencer/</guid>
      <description>
        
          
            Detects the execution of EDRSilencer, a tool that leverages Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server based on PE metadata information.

          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - EDRSilencer Execution - Filter Added</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_hktl_edr_silencer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_hktl_edr_silencer/</guid>
      <description>
        
          
            Detects execution of EDRSilencer, a tool that abuses the Windows Filtering Platform (WFP) to block the outbound traffic of running EDR agents based on specific hardcoded filter names.

          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - PowerTool Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_powertool/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_powertool/</guid>
      <description>
        
          
            Detects the execution of the tool PowerTool which has the ability to kill a process, delete its process file, unload drivers, and delete the driver files
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - Stracciatella Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_stracciatella_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_stracciatella_execution/</guid>
      <description>
        
          
            Detects Stracciatella which executes a Powershell runspace from within C# (aka SharpPick technique) with AMSI, ETW and Script Block Logging disabled based on PE metadata characteristics.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Hide Schedule Task Via Index Value Tamper</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_hide_scheduled_task_via_index_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_hide_scheduled_task_via_index_tamper/</guid>
      <description>
        
          
            Detects when the &#34;index&#34; value of a scheduled task is modified from the registry
Which effectively hides it from any tooling such as &#34;schtasks /query&#34; (Read the referenced link for more information about the effects of this technique)

          
          
        
      </description>
    </item>
    
    <item>
      <title>Hypervisor Enforced Paging Translation Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_deviceguard_hypervisorenforcedpagingtranslation_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_deviceguard_hypervisorenforcedpagingtranslation_disabled/</guid>
      <description>
        
          
            Detects changes to the &#34;DisableHypervisorEnforcedPagingTranslation&#34; registry value. Where the it is set to &#34;1&#34; in order to disable the Hypervisor Enforced Paging Translation feature.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Hypervisor-protected Code Integrity (HVCI) Related Registry Tampering Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hvci_registry_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hvci_registry_tampering/</guid>
      <description>
        
          
            Detects the tampering of Hypervisor-protected Code Integrity (HVCI) related registry values via command line tool reg.exe.
HVCI uses virtualization-based security to protect code integrity by ensuring that only trusted code can run in kernel mode.
Adversaries may tamper with HVCI to load malicious or unsigned drivers, which can be used to escalate privileges, maintain persistence, or evade security mechanisms.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Kaspersky Endpoint Security Stopped Via CommandLine - Linux</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_av_kaspersky_av_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_av_kaspersky_av_disabled/</guid>
      <description>
        
          
            Detects execution of the Kaspersky init.d stop script on Linux systems either directly or via systemctl.
This activity may indicate a manual interruption of the antivirus service by an administrator, or it could be a sign of potential tampering or evasion attempts by malicious actors.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Load Of RstrtMgr.DLL By A Suspicious Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_rstrtmgr_suspicious_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_rstrtmgr_suspicious_load/</guid>
      <description>
        
          
            Detects the load of RstrtMgr DLL (Restart Manager) by a suspicious process.
This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (e.g. Conti ransomware, Cactus ransomware). It has also recently been seen used by the BiBi wiper for Windows.
It could also be used for anti-analysis purposes by shut downing specific processes.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Load Of RstrtMgr.DLL By An Uncommon Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_rstrtmgr_uncommon_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_rstrtmgr_uncommon_load/</guid>
      <description>
        
          
            Detects the load of RstrtMgr DLL (Restart Manager) by an uncommon process.
This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (e.g. Conti ransomware, Cactus ransomware). It has also recently been seen used by the BiBi wiper for Windows.
It could also be used for anti-analysis purposes by shut downing specific processes.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Logging Configuration Changes on Linux Host</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/path/lnx_auditd_logging_config_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/path/lnx_auditd_logging_config_change/</guid>
      <description>
        
          
            Detect changes of syslog daemons configuration files
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Defender Tamper Protection Trigger</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_tamper_protection_trigger/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_tamper_protection_trigger/</guid>
      <description>
        
          
            Detects blocked attempts to change any of Defender&#39;s settings such as &#34;Real Time Monitoring&#34; and &#34;Behavior Monitoring&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Malware Protection Engine Crash</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/application/application_error/win_application_error_msmpeng_crash/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/application/application_error/win_application_error_msmpeng_crash/</guid>
      <description>
        
          
            This rule detects a suspicious crash of the Microsoft Malware Protection Engine
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Malware Protection Engine Crash - WER</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/application/windows_error_reporting/win_application_msmpeng_crash_wer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/application/windows_error_reporting/win_application_msmpeng_crash_wer/</guid>
      <description>
        
          
            This rule detects a suspicious crash of the Microsoft Malware Protection Engine
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Office Protected View Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_disable_protected_view_features/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_disable_protected_view_features/</guid>
      <description>
        
          
            Detects changes to Microsoft Office protected view registry keys with which the attacker disables this feature.
          
          
        
      </description>
    </item>
    
    <item>
      <title>NetNTLM Downgrade Attack</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_net_ntlm_downgrade/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_net_ntlm_downgrade/</guid>
      <description>
        
          
            Detects NetNTLM downgrade attack
          
          
        
      </description>
    </item>
    
    <item>
      <title>NetNTLM Downgrade Attack - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_net_ntlm_downgrade/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_net_ntlm_downgrade/</guid>
      <description>
        
          
            Detects NetNTLM downgrade attack
          
          
        
      </description>
    </item>
    
    <item>
      <title>Obfuscated PowerShell OneLiner Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_download_cradle_obfuscated/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_download_cradle_obfuscated/</guid>
      <description>
        
          
            Detects the execution of a specific OneLiner to download and execute powershell modules in memory.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Okta User Session Start Via An Anonymising Proxy Service</title>
      <link>https://detection.fyi/sigmahq/sigma/identity/okta/okta_user_session_start_via_anonymised_proxy/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/identity/okta/okta_user_session_start_via_anonymised_proxy/</guid>
      <description>
        
          
            Detects when an Okta user session starts where the user is behind an anonymising proxy service.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential AMSI Bypass Script Using NULL Bits</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_amsi_null_bits_bypass/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_amsi_null_bits_bypass/</guid>
      <description>
        
          
            Detects usage of special strings/null bits in order to potentially bypass AMSI functionalities
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential AMSI Bypass Using NULL Bits</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_amsi_null_bits_bypass/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_amsi_null_bits_bypass/</guid>
      <description>
        
          
            Detects usage of special strings/null bits in order to potentially bypass AMSI functionalities
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential AMSI Bypass Via .NET Reflection</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_amsi_init_failed_bypass/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_amsi_init_failed_bypass/</guid>
      <description>
        
          
            Detects Request to &#34;amsiInitFailed&#34; that can be used to disable AMSI Scanning
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential AMSI COM Server Hijacking</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_amsi_com_hijack/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_amsi_com_hijack/</guid>
      <description>
        
          
            Detects changes to the AMSI come server registry key in order disable AMSI scanning functionalities. When AMSI attempts to starts its COM component, it will query its registered CLSID and return a non-existent COM server. This causes a load failure and prevents any scanning methods from being accessed, ultimately rendering AMSI useless
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Ke3chang/TidePool Malware Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/ke3chang-tidepool/proc_creation_win_malware_ke3chang_tidepool/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/ke3chang-tidepool/proc_creation_win_malware_ke3chang_tidepool/</guid>
      <description>
        
          
            Detects registry modifications potentially related to the Ke3chang/TidePool malware as seen in campaigns running in 2019 and 2020
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Privileged System Service Operation - SeLoadDriverPrivilege</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_user_driver_loaded/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_user_driver_loaded/</guid>
      <description>
        
          
            Detects the usage of the &#39;SeLoadDriverPrivilege&#39; privilege. This privilege is required to load or unload a device driver.
With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode.
This user right does not apply to Plug and Play device drivers.
If you exclude privileged users/admins and processes, which are allowed to do so, you are maybe left with bad programs trying to load malicious kernel drivers.
This will detect Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs) and the usage of Sysinternals and various other tools. So you have to work with a whitelist to find the bad stuff.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Suspicious Activity Using SeCEdit</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_secedit_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_secedit_execution/</guid>
      <description>
        
          
            Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Tampering With Security Products Via WMIC</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_uninstall_security_products/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_uninstall_security_products/</guid>
      <description>
        
          
            Detects uninstallation or termination of security products using the WMIC utility
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Windows Defender Tampering Via Wmic.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_namespace_defender/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_namespace_defender/</guid>
      <description>
        
          
            Detects potential tampering with Windows Defender settings such as adding exclusion using wmic
          
          
        
      </description>
    </item>
    
    <item>
      <title>Powershell Base64 Encoded MpPreference Cmdlet</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_mppreference/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_mppreference/</guid>
      <description>
        
          
            Detects base64 encoded &#34;MpPreference&#34; PowerShell cmdlet code that tries to modifies or tamper with Windows Defender AV
          
          
        
      </description>
    </item>
    
    <item>
      <title>Powershell Defender Disable Scan Feature</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_defender_disable_feature/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_defender_disable_feature/</guid>
      <description>
        
          
            Detects requests to disable Microsoft Defender features using PowerShell commands
          
          
        
      </description>
    </item>
    
    <item>
      <title>Powershell Defender Exclusion</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_defender_exclusion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_defender_exclusion/</guid>
      <description>
        
          
            Detects requests to exclude files, folders or processes from Antivirus scanning using PowerShell cmdlets
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Defender Threat Severity Default Action Set to &#39;Allow&#39; or &#39;NoAction&#39;</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_defender_default_action_modified/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_defender_default_action_modified/</guid>
      <description>
        
          
            Detects the use of PowerShell to execute the &#39;Set-MpPreference&#39; cmdlet to configure Windows Defender&#39;s threat severity default action to &#39;Allow&#39; (value &#39;6&#39;) or &#39;NoAction&#39; (value &#39;9&#39;).
This is a highly suspicious configuration change that effectively disables Defender&#39;s ability to automatically mitigate threats of a certain severity level.
An attacker might use this technique via the command line to bypass defenses before executing payloads.

          
          
        
      </description>
    </item>
    
    <item>
      <title>PPL Tampering Via WerFaultSecure</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_werfaultsecure_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_werfaultsecure_abuse/</guid>
      <description>
        
          
            Detects potential abuse of WerFaultSecure.exe to dump Protected Process Light (PPL) processes like LSASS or to freeze security solutions (EDR/antivirus).
This technique is used by tools such as EDR-Freeze and WSASS to bypass PPL protections and access sensitive information or disable security software.
Distinct command line patterns help identify the specific tool:
- WSASS usage typically shows: &#34;WSASS.exe WerFaultSecure.exe [PID]&#34; in ParentCommandLine
- EDR-Freeze usage typically shows: &#34;EDR-Freeze_[version].exe [PID] [timeout]&#34; in ParentCommandLine
Legitimate debugging operations using WerFaultSecure are rare in production environments and should be investigated.

          
          
        
      </description>
    </item>
    
    <item>
      <title>PUA - CleanWipe Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_cleanwipe/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_cleanwipe/</guid>
      <description>
        
          
            Detects the use of CleanWipe a tool usually used to delete Symantec antivirus.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Python Function Execution Security Warning Disabled In Excel</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_office_disable_python_security_warnings/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_office_disable_python_security_warnings/</guid>
      <description>
        
          
            Detects changes to the registry value &#34;PythonFunctionWarnings&#34; that would prevent any warnings or alerts from showing when Python functions are about to be executed.
Threat actors could run malicious code through the new Microsoft Excel feature that allows Python to run within the spreadsheet.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Python Function Execution Security Warning Disabled In Excel - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_disable_python_security_warnings/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_office_disable_python_security_warnings/</guid>
      <description>
        
          
            Detects changes to the registry value &#34;PythonFunctionWarnings&#34; that would prevent any warnings or alerts from showing when Python functions are about to be executed.
Threat actors could run malicious code through the new Microsoft Excel feature that allows Python to run within the spreadsheet.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Raccine Uninstall</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_disable_raccine/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_disable_raccine/</guid>
      <description>
        
          
            Detects commands that indicate a Raccine removal from an end system. Raccine is a free ransomware protection tool.
          
          
        
      </description>
    </item>
    
    <item>
      <title>RedSun - Named Pipe Created</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/pipe_created_win_exploit_redsun_named_pipe/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/pipe_created_win_exploit_redsun_named_pipe/</guid>
      <description>
        
          
            Detects the creation of a named pipe with the hardcoded name &#34;REDSUN&#34;.
The RedSun exploit tool uses a pipe with this name for synchronisation and command communication between its components during the Cloud Files API + oplock-based AV bypass and privilege escalation chain.
RedSun creates the pipe as \\??\pipe\REDSUN.
The pipe server listens for the token-duplicated elevated process to connect and respond, completing the privilege escalation from user to SYSTEM.
Presence of this pipe name indicates active or recent RedSun execution.

          
          
        
      </description>
    </item>
    
    <item>
      <title>RedSun - TieringEngineService.exe Detected as EICAR Test File</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/win_defender_exploit_redsun_tiering_engine_detected_as_eicar/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/win_defender_exploit_redsun_tiering_engine_detected_as_eicar/</guid>
      <description>
        
          
            Detects Windows Defender (EventID 1119 - Remediation Action Failed) flagging TieringEngineService.exe
dropped in a characteristic RS-{GUID} temporary directory, or the RedSun.exe process itself being present.
This covers the staging pattern used by RedSun, a Cloud Files API and opportunistic lock (oplock) based
AV bypass/privilege escalation tool.

RedSun works as follows:
  1. Registers a Cloud Files sync root and creates a Cloud Files placeholder for TieringEngineService.exe under %TEMP%\RS-{GUID}\
  2. The placeholder file carries EICAR test file content (Virus:DOS/EICAR_Test_File) to reliably trigger
     a Defender scan and remediation attempt
  3. Requests a batch oplock (FSCTL_REQUEST_BATCH_OPLOCK) on the placeholder file
  4. When Defender attempts to scan/quarantine the file, the oplock triggers - holding the file open
  5. During the oplock break window, RedSun swaps the mount point (junction) to redirect
     \\?\C:\Windows\System32 to the attacker-controlled temp path
  6. This races the AV/OS into executing the malicious TieringEngineService.exe with elevated privileges

          
          
        
      </description>
    </item>
    
    <item>
      <title>Reg Add Suspicious Paths</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_susp_paths/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_susp_paths/</guid>
      <description>
        
          
            Detects when an adversary uses the reg.exe utility to add or modify new keys or subkeys
          
          
        
      </description>
    </item>
    
    <item>
      <title>Removal Of AMSI Provider Registry Keys</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_removal_amsi_registry_key/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_removal_amsi_registry_key/</guid>
      <description>
        
          
            Detects the deletion of AMSI provider registry key entries in HKLM\Software\Microsoft\AMSI. This technique could be used by an attacker in order to disable AMSI inspection.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Removal Of Index Value to Hide Schedule Task - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_index_value_removal/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_index_value_removal/</guid>
      <description>
        
          
            Detects when the &#34;index&#34; value of a scheduled task is removed or deleted from the registry. Which effectively hides it from any tooling such as &#34;schtasks /query&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Removal Of SD Value to Hide Schedule Task - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_sd_value_removal/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_sd_value_removal/</guid>
      <description>
        
          
            Remove SD (Security Descriptor) value in \Schedule\TaskCache\Tree registry hive to hide schedule task. This technique is used by Tarrask malware
          
          
        
      </description>
    </item>
    
    <item>
      <title>SafeBoot Registry Key Deleted Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_delete_safeboot/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_delete_safeboot/</guid>
      <description>
        
          
            Detects execution of &#34;reg.exe&#34; commands with the &#34;delete&#34; flag on safe boot registry keys. Often used by attacker to prevent safeboot execution of security products
          
          
        
      </description>
    </item>
    
    <item>
      <title>Scripted Diagnostics Turn Off Check Enabled - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_enabling_turnoffcheck/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_enabling_turnoffcheck/</guid>
      <description>
        
          
            Detects enabling TurnOffCheck which can be used to bypass defense of MSDT Follina vulnerability
          
          
        
      </description>
    </item>
    
    <item>
      <title>Security Service Disabled Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_disable_sec_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_disable_sec_services/</guid>
      <description>
        
          
            Detects execution of &#34;reg.exe&#34; to disable security services such as Windows Defender.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Service Registry Key Deleted Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_delete_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_delete_services/</guid>
      <description>
        
          
            Detects execution of &#34;reg.exe&#34; commands with the &#34;delete&#34; flag on services registry key. Often used by attacker to remove AV software services
          
          
        
      </description>
    </item>
    
    <item>
      <title>Service Startup Type Change Via Wmic.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_service_startup_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_service_startup_change/</guid>
      <description>
        
          
            Detects changes to service startup type to &#39;disabled&#39; or &#39;manual&#39; using the WMIC command-line utility.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Service StartupType Change Via PowerShell Set-Service</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_set_service_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_set_service_disabled/</guid>
      <description>
        
          
            Detects the use of the PowerShell &#34;Set-Service&#34; cmdlet to change the startup type of a service to &#34;disabled&#34; or &#34;manual&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Service StartupType Change Via Sc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sc_disable_service/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sc_disable_service/</guid>
      <description>
        
          
            Detect the use of &#34;sc.exe&#34; to change the startup type of a service to &#34;disabled&#34; or &#34;demand&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Application Allowed Through Exploit Guard</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_exploit_guard_susp_allowed_apps/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_exploit_guard_susp_allowed_apps/</guid>
      <description>
        
          
            Detects applications being added to the &#34;allowed applications&#34; list of exploit guard in order to bypass controlled folder settings
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Loading of Dbgcore/Dbghelp DLLs from Uncommon Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_win_susp_dbgcore_dbghelp_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_win_susp_dbgcore_dbghelp_load/</guid>
      <description>
        
          
            Detects loading of dbgcore.dll or dbghelp.dll from uncommon locations such as user directories.
These DLLs contain the MiniDumpWriteDump function, which can be abused for credential dumping purposes or in some cases for evading EDR/AV detection by suspending processes.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Path In Keyboard Layout IME File Registry Value</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_ime_suspicious_paths/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_ime_suspicious_paths/</guid>
      <description>
        
          
            Detects usage of Windows Input Method Editor (IME) keyboard layout feature, which allows an attacker to load a DLL into the process after sending the WM_INPUTLANGCHANGEREQUEST message.
Before doing this, the client needs to register the DLL in a special registry key that is assumed to implement this keyboard layout. This registry key should store a value named &#34;Ime File&#34; with a DLL path.
IMEs are essential for languages that have more characters than can be represented on a standard keyboard, such as Chinese, Japanese, and Korean.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Process Access of MsMpEng by WerFaultSecure - EDR-Freeze</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_werfaultsecure_msmpeng_access/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_werfaultsecure_msmpeng_access/</guid>
      <description>
        
          
            Detects process access events where WerFaultSecure accesses MsMpEng.exe with dbgcore.dll or dbghelp.dll in the call trace, indicating potential EDR freeze techniques.
This technique leverages WerFaultSecure.exe running as a Protected Process Light (PPL) with WinTCB protection level to call MiniDumpWriteDump and suspend EDR/AV processes, allowing malicious activity to execute undetected during the suspension period.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Process Access to LSASS with Dbgcore/Dbghelp DLLs</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_susp_dbgcore_dbghelp_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_susp_dbgcore_dbghelp_load/</guid>
      <description>
        
          
            Detects suspicious process access to LSASS.exe from processes located in uncommon locations with dbgcore.dll or dbghelp.dll in the call trace.
These DLLs contain functions like MiniDumpWriteDump that can be abused for credential dumping purposes. While modern tools like Mimikatz have moved to using ntdll.dll,
dbgcore.dll and dbghelp.dll are still used by basic credential dumping utilities and legacy tools for LSASS memory access and process suspension techniques.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious PROCEXP152.sys File Created In TMP</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_procexplorer_driver_created_in_tmp_folder/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_procexplorer_driver_created_in_tmp_folder/</guid>
      <description>
        
          
            Detects the creation of the PROCEXP152.sys file in the application-data local temporary folder.
This driver is used by Sysinternals Process Explorer but also by KDU (https://github.com/hfiref0x/KDU) or Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Service Installed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_service_installed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_service_installed/</guid>
      <description>
        
          
            Detects installation of NalDrv or PROCEXP152 services via registry-keys to non-system32 folders.
Both services are used in the tool Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU (https://github.com/hfiref0x/KDU)

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Uninstall of Windows Defender Feature via PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_uninstall_defender_feature/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_uninstall_defender_feature/</guid>
      <description>
        
          
            Detects the use of PowerShell with Uninstall-WindowsFeature or Remove-WindowsFeature cmdlets to disable or remove the Windows Defender GUI feature, a common technique used by adversaries to evade defenses.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Windows Defender Folder Exclusion Added Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_defender_exclusion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_defender_exclusion/</guid>
      <description>
        
          
            Detects the usage of &#34;reg.exe&#34; to add Defender folder exclusions. Qbot has been seen using this technique to add exclusions for folders within AppData and ProgramData.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Windows Defender Registry Key Tampering Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_windows_defender_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_windows_defender_tamper/</guid>
      <description>
        
          
            Detects the usage of &#34;reg.exe&#34; to tamper with different Windows Defender registry keys in order to disable some important features related to protection and detection

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Windows Service Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_service_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_service_tamper/</guid>
      <description>
        
          
            Detects the usage of binaries such as &#39;net&#39;, &#39;sc&#39; or &#39;powershell&#39; in order to stop, pause, disable or delete critical or important Windows services such as AV, Backup, etc. As seen being used in some ransomware scripts

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Windows Trace ETW Session Tamper Via Logman.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_logman_disable_eventlog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_logman_disable_eventlog/</guid>
      <description>
        
          
            Detects the execution of &#34;logman&#34; utility in order to disable or delete Windows trace sessions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysinternals PsSuspend Suspicious Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_pssuspend_susp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_pssuspend_susp_execution/</guid>
      <description>
        
          
            Detects suspicious execution of Sysinternals PsSuspend, where the utility is used to suspend critical processes such as AV or EDR to bypass defenses
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Application Crashed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/application_popup/win_system_application_sysmon_crash/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/application_popup/win_system_application_sysmon_crash/</guid>
      <description>
        
          
            Detects application popup reporting a failure of the Sysmon service
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Configuration Update</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_sysmon_config_update/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_sysmon_config_update/</guid>
      <description>
        
          
            Detects updates to Sysmon&#39;s configuration. Attackers might update or replace the Sysmon configuration with a bare bone one to avoid monitoring without shutting down the service completely
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Driver Altitude Change</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_change_sysmon_driver_altitude/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_change_sysmon_driver_altitude/</guid>
      <description>
        
          
            Detects changes in Sysmon driver altitude value.
If the Sysmon driver is configured to load at an altitude of another registered service, it will fail to load at boot.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Driver Unloaded Via Fltmc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver_sysmon/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver_sysmon/</guid>
      <description>
        
          
            Detects possible Sysmon filter driver unloaded via fltmc.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Tamper Windows Defender - PSClassic</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_classic/posh_pc_tamper_windows_defender_set_mp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_classic/posh_pc_tamper_windows_defender_set_mp/</guid>
      <description>
        
          
            Attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Tamper Windows Defender - ScriptBlockLogging</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_tamper_windows_defender_set_mp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_tamper_windows_defender_set_mp/</guid>
      <description>
        
          
            Detects PowerShell scripts attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Tamper Windows Defender Remove-MpPreference</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_remove_mppreference/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_remove_mppreference/</guid>
      <description>
        
          
            Detects attempts to remove Windows Defender configurations using the &#39;MpPreference&#39; cmdlet
          
          
        
      </description>
    </item>
    
    <item>
      <title>Tamper Windows Defender Remove-MpPreference - ScriptBlockLogging</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_tamper_windows_defender_rem_mp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_tamper_windows_defender_rem_mp/</guid>
      <description>
        
          
            Detects attempts to remove Windows Defender configuration using the &#39;MpPreference&#39; cmdlet
          
          
        
      </description>
    </item>
    
    <item>
      <title>Tamper With Sophos AV Registry Keys</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_sophos_av_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_sophos_av_tamper/</guid>
      <description>
        
          
            Detects tamper attempts to sophos av functionality via registry key modification
          
          
        
      </description>
    </item>
    
    <item>
      <title>Taskkill Symantec Endpoint Protection</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_taskkill_sep/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_taskkill_sep/</guid>
      <description>
        
          
            Detects one of the possible scenarios for disabling Symantec Endpoint Protection.
Symantec Endpoint Protection antivirus software services incorrectly implement the protected service mechanism.
As a result, the NT AUTHORITY/SYSTEM user can execute the taskkill /im command several times ccSvcHst.exe /f, thereby killing the process belonging to the service, and thus shutting down the service.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Extension In Keyboard Layout IME File Registry Value</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_ime_non_default_extension/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_ime_non_default_extension/</guid>
      <description>
        
          
            Detects usage of Windows Input Method Editor (IME) keyboard layout feature, which allows an attacker to load a DLL into the process after sending the WM_INPUTLANGCHANGEREQUEST message.
Before doing this, the client needs to register the DLL in a special registry key that is assumed to implement this keyboard layout. This registry key should store a value named &#34;Ime File&#34; with a DLL path.
IMEs are essential for languages that have more characters than can be represented on a standard keyboard, such as Chinese, Japanese, and Korean.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uninstall Crowdstrike Falcon Sensor</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_uninstall_crowdstrike_falcon/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_uninstall_crowdstrike_falcon/</guid>
      <description>
        
          
            Adversaries may disable security tools to avoid possible detection of their tools and activities by uninstalling Crowdstrike Falcon
          
          
        
      </description>
    </item>
    
    <item>
      <title>Uninstall Sysinternals Sysmon</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_sysmon_uninstall/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_sysmon_uninstall/</guid>
      <description>
        
          
            Detects the removal of Sysmon, which could be a potential attempt at defense evasion
          
          
        
      </description>
    </item>
    
    <item>
      <title>Vulnerable Driver Blocklist Registry Tampering Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vulnerable_driver_blocklist_registry_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vulnerable_driver_blocklist_registry_tampering/</guid>
      <description>
        
          
            Detects tampering of the Vulnerable Driver Blocklist registry via command line tools such as PowerShell or REG.EXE.
The Vulnerable Driver Blocklist is a security feature that helps prevent the loading of known vulnerable drivers.
Disabling this feature may indicate an attempt to bypass security controls, often targeted by threat actors
to facilitate the installation of malicious or vulnerable drivers, particularly in scenarios involving Endpoint Detection and Response

          
          
        
      </description>
    </item>
    
    <item>
      <title>Weak Encryption Enabled and Kerberoast</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_alert_enable_weak_encryption/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_alert_enable_weak_encryption/</guid>
      <description>
        
          
            Detects scenario where weak encryption is enabled for a user profile which could be used for hash/password cracking.
          
          
        
      </description>
    </item>
    
    <item>
      <title>WFP Filter Added via Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_wfp_filter_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_wfp_filter_added/</guid>
      <description>
        
          
            Detects registry modifications that add Windows Filtering Platform (WFP) filters, which may be used to block security tools and EDR agents from reporting events.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Win Defender Restored Quarantine File</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_restored_quarantine_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_restored_quarantine_file/</guid>
      <description>
        
          
            Detects the restoration of files from the defender quarantine
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows AMSI Related Registry Tampering Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_amsi_registry_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_amsi_registry_tampering/</guid>
      <description>
        
          
            Detects tampering of AMSI (Anti-Malware Scan Interface) related registry values via command line tools such as reg.exe or PowerShell.
AMSI provides a generic interface for applications and services to integrate with antimalware products.
Adversaries may disable AMSI to evade detection of malicious scripts and code execution.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Credential Guard Disabled - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_credential_guard_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_credential_guard_disabled/</guid>
      <description>
        
          
            Detects attempts to disable Windows Credential Guard by setting registry values to 0. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
Adversaries may disable Credential Guard to gain access to sensitive credentials stored in the system, such as NTLM hashes and Kerberos tickets, which can be used for lateral movement and privilege escalation.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Credential Guard Registry Tampering Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_credential_guard_registry_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_credential_guard_registry_tampering/</guid>
      <description>
        
          
            Detects attempts to add, modify, or delete Windows Credential Guard related registry keys or values via command line tools such as Reg.exe or PowerShell.
Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
Adversaries may disable Credential Guard to gain access to sensitive credentials stored in the system, such as NTLM hashes and Kerberos tickets, which can be used for lateral movement and privilege escalation.
The rule matches suspicious command lines that target DeviceGuard or LSA registry paths and manipulate keys like EnableVirtualizationBasedSecurity, RequirePlatformSecurityFeatures, or LsaCfgFlags.
Such activity may indicate an attempt to disable or tamper with Credential Guard, potentially exposing sensitive credentials for misuse.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Credential Guard Related Registry Value Deleted - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_disable_credential_guard/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_disable_credential_guard/</guid>
      <description>
        
          
            Detects attempts to disable Windows Credential Guard by deleting registry values. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
Adversaries may disable Credential Guard to gain access to sensitive credentials stored in the system, such as NTLM hashes and Kerberos tickets, which can be used for lateral movement and privilege escalation.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Configuration Changes</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_suspicious_features_tampering/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_suspicious_features_tampering/</guid>
      <description>
        
          
            Detects suspicious changes to the Windows Defender configuration
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Context Menu Removed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_defender_remove_context_menu/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_defender_remove_context_menu/</guid>
      <description>
        
          
            Detects the use of reg.exe or PowerShell to delete the Windows Defender context menu handler registry keys.
This action removes the &#34;Scan with Microsoft Defender&#34; option from the right-click menu for files, directories, and drives.
Attackers may use this technique to hinder manual, on-demand scans and reduce the visibility of the security product.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Definition Files Removed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mpcmdrun_remove_windows_defender_definition/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mpcmdrun_remove_windows_defender_definition/</guid>
      <description>
        
          
            Adversaries may disable security tools to avoid possible detection of their tools and activities by removing Windows Defender Definition Files
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Exclusion List Modified</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_windows_defender_exclusions_registry_modified/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_windows_defender_exclusions_registry_modified/</guid>
      <description>
        
          
            Detects modifications to the Windows Defender exclusion registry key. This could indicate a potentially suspicious or even malicious activity by an attacker trying to add a new exclusion in order to bypass security.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Exclusion Registry Key - Write Access Requested</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_windows_defender_exclusions_write_access/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_windows_defender_exclusions_write_access/</guid>
      <description>
        
          
            Detects write access requests to the Windows Defender exclusions registry keys. This could be an indication of an attacker trying to request a handle or access the object to write new exclusions in order to bypass security.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Exclusions Added</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_config_change_exclusion_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_config_change_exclusion_added/</guid>
      <description>
        
          
            Detects the Setting of Windows Defender Exclusions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Exclusions Added - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_win_defender_exclusions_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_win_defender_exclusions_added/</guid>
      <description>
        
          
            Detects modifications to the Windows Defender configuration settings using PowerShell to add exclusions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Exclusions Added - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_defender_exclusions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_defender_exclusions/</guid>
      <description>
        
          
            Detects the Setting of Windows Defender Exclusions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Exploit Guard Tamper</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_config_change_exploit_guard_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_config_change_exploit_guard_tamper/</guid>
      <description>
        
          
            Detects when someone is adding or removing applications or folders from exploit guard &#34;ProtectedFolders&#34; or &#34;AllowedApplications&#34;

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Grace Period Expired</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_antimalware_platform_expired/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_antimalware_platform_expired/</guid>
      <description>
        
          
            Detects the expiration of the grace period of Windows Defender. This means protection against viruses, spyware, and other potentially unwanted software is disabled.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Malware And PUA Scanning Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_malware_and_pua_scan_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_malware_and_pua_scan_disabled/</guid>
      <description>
        
          
            Detects disabling of the Windows Defender feature of scanning for malware and other potentially unwanted software
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Real-time Protection Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_real_time_protection_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_real_time_protection_disabled/</guid>
      <description>
        
          
            Detects disabling of Windows Defender Real-time Protection. As this event doesn&#39;t contain a lot of information on who initiated this action you might want to reduce it to a &#34;medium&#34; level if this occurs too many times in your environment

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Real-Time Protection Failure/Restart</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_real_time_protection_errors/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_real_time_protection_errors/</guid>
      <description>
        
          
            Detects issues with Windows Defender Real-Time Protection features
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Service Disabled - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_windows_defender_service/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_windows_defender_service/</guid>
      <description>
        
          
            Detects when an attacker or tool disables the  Windows Defender service (WinDefend) via the registry
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Submit Sample Feature Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_config_change_sample_submission_consent/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_config_change_sample_submission_consent/</guid>
      <description>
        
          
            Detects disabling of the &#34;Automatic Sample Submission&#34; feature of Windows Defender.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Threat Detection Service Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_defender_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_defender_disabled/</guid>
      <description>
        
          
            Detects when the &#34;Windows Defender Threat Protection&#34; service is disabled.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Threat Severity Default Action Modified</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_defender_threat_action_modified/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_defender_threat_action_modified/</guid>
      <description>
        
          
            Detects modifications or creations of Windows Defender&#39;s default threat action settings based on severity to &#39;allow&#39; or take &#39;no action&#39;.
This is a highly suspicious configuration change that effectively disables Defender&#39;s ability to automatically mitigate threats of a certain severity level,
allowing malicious software to run unimpeded. An attacker might use this technique to bypass defenses before executing payloads.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Virus Scanning Feature Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_virus_scan_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_virus_scan_disabled/</guid>
      <description>
        
          
            Detects disabling of the Windows Defender virus scanning feature
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Filtering Platform Blocked Connection From EDR Agent Binary</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/object_access/win_security_wfp_endpoint_agent_blocked/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/object_access/win_security_wfp_endpoint_agent_blocked/</guid>
      <description>
        
          
            Detects a Windows Filtering Platform (WFP) blocked connection event involving common Endpoint Detection and Response (EDR) agents.
Adversaries may use WFP filters to prevent Endpoint Detection and Response (EDR) agents from reporting security events.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Firewall Disabled via PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_disable_firewall/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_disable_firewall/</guid>
      <description>
        
          
            Detects attempts to disable the Windows Firewall using PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Hypervisor Enforced Code Integrity Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_deviceguard_hypervisorenforcedcodeintegrity_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_deviceguard_hypervisorenforcedcodeintegrity_disabled/</guid>
      <description>
        
          
            Detects changes to the HypervisorEnforcedCodeIntegrity registry key and the &#34;Enabled&#34; value being set to 0 in order to disable the Hypervisor Enforced Code Integrity feature. This allows an attacker to load unsigned and untrusted code to be run in the kernel

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Vulnerable Driver Blocklist Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_vulnerable_driver_blocklist_disable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_vulnerable_driver_blocklist_disable/</guid>
      <description>
        
          
            Detects when the Windows Vulnerable Driver Blocklist is set to disabled. This setting is crucial for preventing the loading of known vulnerable drivers,
and its modification may indicate an attempt to bypass security controls. It is often targeted by threat actors to facilitate the installation of malicious or vulnerable drivers,
particularly in scenarios involving Endpoint Detection and Response (EDR) bypass techniques.
This rule applies to systems that support the Vulnerable Driver Blocklist feature, including Windows 10 version 1903 and later, and Windows Server 2022 and later.
Note that this change will require a reboot to take effect, and this rule only detects the registry modification action.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Write Protect For Storage Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_write_protect_for_storage_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_write_protect_for_storage_disabled/</guid>
      <description>
        
          
            Detects applications trying to modify the registry in order to disable any write-protect property for storage devices.
This could be a precursor to a ransomware attack and has been an observed technique used by cypherpunk group.

          
          
        
      </description>
    </item>
    
  </channel>
</rss>
