EXPLORE
← Back to Explore
sigmahighHunting

Important Windows Event Auditing Disabled

Detects scenarios where system auditing for important events such as "Process Creation" or "Logon" events is disabled.

MITRE ATT&CK

defense-evasion

Detection Query

selection_state_success_and_failure:
  EventID: 4719
  SubcategoryGuid:
    - "{0CCE9210-69AE-11D9-BED3-505054503030}"
    - "{0CCE9211-69AE-11D9-BED3-505054503030}"
    - "{0CCE9212-69AE-11D9-BED3-505054503030}"
    - "{0CCE9215-69AE-11D9-BED3-505054503030}"
    - "{0CCE921B-69AE-11D9-BED3-505054503030}"
    - "{0CCE922B-69AE-11D9-BED3-505054503030}"
    - "{0CCE922F-69AE-11D9-BED3-505054503030}"
    - "{0CCE9230-69AE-11D9-BED3-505054503030}"
    - "{0CCE9235-69AE-11D9-BED3-505054503030}"
    - "{0CCE9236-69AE-11D9-BED3-505054503030}"
    - "{0CCE9237-69AE-11D9-BED3-505054503030}"
    - "{0CCE923F-69AE-11D9-BED3-505054503030}"
    - "{0CCE9240-69AE-11D9-BED3-505054503030}"
    - "{0CCE9242-69AE-11D9-BED3-505054503030}"
  AuditPolicyChanges|contains:
    - "%%8448"
    - "%%8450"
selection_state_success_only:
  EventID: 4719
  SubcategoryGuid: "{0CCE9217-69AE-11D9-BED3-505054503030}"
  AuditPolicyChanges|contains: "%%8448"
condition: 1 of selection_*

Author

Nasreddine Bencherchali (Nextron Systems)

Created

2023-06-20

Data Sources

windowssecurity

Platforms

windows

Tags

attack.defense-evasionattack.t1562.002
Raw Content
title: Important Windows Event Auditing Disabled
id: ab4561b1-6c7e-48a7-ad08-087cfb9ce8f1
related:
    - id: 69aeb277-f15f-4d2d-b32a-55e883609563
      type: derived
status: test
description: Detects scenarios where system auditing for important events such as "Process Creation" or "Logon" events is disabled.
references:
    - https://docs.google.com/presentation/d/1dkrldTTlN3La-OjWtkWJBb4hVk6vfsSMBFBERs6R8zA/edit
    - https://github.com/SigmaHQ/sigma/blob/ad1bfd3d28aa0ccc9656240f845022518ef65a2e/documentation/logsource-guides/windows/service/security.md
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-06-20
modified: 2023-11-17
tags:
    - attack.defense-evasion
    - attack.t1562.002
logsource:
    product: windows
    service: security
    definition: dfd8c0f4-e6ad-4e07-b91b-f2fca0ddef64
detection:
    selection_state_success_and_failure:
        EventID: 4719
        SubcategoryGuid:
            # Note: Add or remove GUID as you see fit in your env
            - '{0CCE9210-69AE-11D9-BED3-505054503030}' # Audit Security State Change
            - '{0CCE9211-69AE-11D9-BED3-505054503030}' # Audit Security System Extension
            - '{0CCE9212-69AE-11D9-BED3-505054503030}' # Audit System Integrity
            - '{0CCE9215-69AE-11D9-BED3-505054503030}' # Audit Logon
            - '{0CCE921B-69AE-11D9-BED3-505054503030}' # Audit Special Logon
            - '{0CCE922B-69AE-11D9-BED3-505054503030}' # Audit Process Creation
            - '{0CCE922F-69AE-11D9-BED3-505054503030}' # Audit Audit Policy Change
            - '{0CCE9230-69AE-11D9-BED3-505054503030}' # Audit Authentication Policy Change
            - '{0CCE9235-69AE-11D9-BED3-505054503030}' # Audit User Account Management
            - '{0CCE9236-69AE-11D9-BED3-505054503030}' # Audit Computer Account Management
            - '{0CCE9237-69AE-11D9-BED3-505054503030}' # Audit Security Group Management
            - '{0CCE923F-69AE-11D9-BED3-505054503030}' # Audit Credential Validation
            - '{0CCE9240-69AE-11D9-BED3-505054503030}' # Audit Kerberos Service Ticket Operations
            - '{0CCE9242-69AE-11D9-BED3-505054503030}' # Audit Kerberos Authentication Service
        AuditPolicyChanges|contains:
            - '%%8448' # This is "Success removed"
            - '%%8450' # This is "Failure removed"
    selection_state_success_only:
        EventID: 4719
        SubcategoryGuid: '{0CCE9217-69AE-11D9-BED3-505054503030}' # Audit Account Lockout
        AuditPolicyChanges|contains: '%%8448'
    condition: 1 of selection_*
falsepositives:
    - Unlikely
level: high