<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>attack.t1686.003 on Detection.FYI</title>
    <link>https://detection.fyi/tags/attack.t1686.003/</link>
    <description>Recent content in attack.t1686.003 on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Tue, 28 Apr 2026 23:20:23 +0000</lastBuildDate><atom:link href="https://detection.fyi/tags/attack.t1686.003/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>A Rule Has Been Deleted From The Windows Firewall Exception List</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_delete_rule/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_delete_rule/</guid>
      <description>
        
          
            Detects when a single rules or all of the rules have been deleted from the Windows Defender Firewall
          
          
        
      </description>
    </item>
    
    <item>
      <title>All Rules Have Been Deleted From The Windows Firewall Configuration</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_delete_all_rules/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_delete_all_rules/</guid>
      <description>
        
          
            Detects when a all the rules have been deleted from the Windows Defender Firewall configuration
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Microsoft Defender Firewall via Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_defender_firewall/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_defender_firewall/</guid>
      <description>
        
          
            Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Windows Firewall by Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_windows_firewall/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_windows_firewall/</guid>
      <description>
        
          
            Detect set EnableFirewall to 0 to disable the Windows firewall
          
          
        
      </description>
    </item>
    
    <item>
      <title>Firewall Disabled via Netsh.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_disable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_disable/</guid>
      <description>
        
          
            Detects netsh commands that turns off the Windows firewall
          
          
        
      </description>
    </item>
    
    <item>
      <title>Firewall Rule Deleted Via Netsh.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_delete_rule/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_delete_rule/</guid>
      <description>
        
          
            Detects the removal of a port or application rule in the Windows Firewall configuration using netsh
          
          
        
      </description>
    </item>
    
    <item>
      <title>Netsh Allow Group Policy on Microsoft Defender Firewall</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_enable_group_rule/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_enable_group_rule/</guid>
      <description>
        
          
            Adversaries may modify system firewalls in order to bypass controls limiting network usage
          
          
        
      </description>
    </item>
    
    <item>
      <title>New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_add_rule_susp_folder/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_add_rule_susp_folder/</guid>
      <description>
        
          
            Detects the addition of a new rule to the Windows Firewall exception list for an application located in a potentially suspicious location.
          
          
        
      </description>
    </item>
    
    <item>
      <title>New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_add_rule_wmiprvse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_add_rule_wmiprvse/</guid>
      <description>
        
          
            Detects the addition of a new &#34;Allow&#34; firewall rule by the WMI process (WmiPrvSE.EXE).
This can occur if an attacker leverages PowerShell cmdlets such as &#34;New-NetFirewallRule&#34;, or directly uses WMI CIM classes such as &#34;MSFT_NetFirewallRule&#34;.

          
          
        
      </description>
    </item>
    
    <item>
      <title>New Firewall Rule Added Via Netsh.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_add_rule/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_add_rule/</guid>
      <description>
        
          
            Detects the addition of a new rule to the Windows firewall via netsh
          
          
        
      </description>
    </item>
    
    <item>
      <title>RDP Connection Allowed Via Netsh.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_allow_rdp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_allow_rdp/</guid>
      <description>
        
          
            Detects usage of the netsh command to open and allow connections to port 3389 (RDP). As seen used by Sarwent Malware
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Program Location Whitelisted In Firewall Via Netsh.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_allow_program_in_susp_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_netsh_fw_allow_program_in_susp_location/</guid>
      <description>
        
          
            Detects Netsh command execution that whitelists a program located in a suspicious location in the Windows Firewall
          
          
        
      </description>
    </item>
    
    <item>
      <title>The Windows Defender Firewall Service Failed To Load Group Policy</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_failed_load_gpo/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_failed_load_gpo/</guid>
      <description>
        
          
            Detects activity when The Windows Defender Firewall service failed to load Group Policy
          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon New Firewall Rule Added In Windows Firewall Exception List</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_add_rule/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_add_rule/</guid>
      <description>
        
          
            Detects when a rule has been added to the Windows Firewall exception list
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Defender Firewall Has Been Reset To Its Default Configuration</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_reset_config/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_reset_config/</guid>
      <description>
        
          
            Detects activity when Windows Defender Firewall has been reset to its default configuration
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Firewall Profile Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_windows_firewall_profile_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_windows_firewall_profile_disabled/</guid>
      <description>
        
          
            Detects when a user disables the Windows Firewall via a Profile to help evade defense.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Firewall Settings Have Been Changed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_setting_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/firewall_as/win_firewall_as_setting_change/</guid>
      <description>
        
          
            Detects activity when the settings of the Windows firewall have been changed
          
          
        
      </description>
    </item>
    
  </channel>
</rss>
