EXPLORE
← Back to Explore
T1685.001

Disable or Modify Windows Event Log

Adversaries may disable or modify the Windows Event Log to limit data that can be leveraged for detections and audits. Windows Event Log records user and system activity such as login attempts and process creation.(Citation: EventLog_Core_Technologies) This data is used by security tools and analysts to generate detections. The EventLog service maintains event logs from various system components and applications. By default, the service automatically starts when a system powers on. An audit po...

Windows
26
Detections
1
Sources
2
Threat Actors

BY SOURCE

26sigma

PROCEDURES (17)

Driver3 detections

Auto-extracted: 3 detections for driver

Service3 detections

Auto-extracted: 3 detections for service

Process Creation Monitoring3 detections

Auto-extracted: 3 detections for process creation monitoring

Registry2 detections

Auto-extracted: 2 detections for registry

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Tamper2 detections

Auto-extracted: 2 detections for tamper

Authentication Monitoring1 detections

Auto-extracted: 1 detections for authentication monitoring

Driver1 detections

Auto-extracted: 1 detections for driver

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Service1 detections

Auto-extracted: 1 detections for service

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Event Log1 detections

Auto-extracted: 1 detections for event log

Http1 detections

Auto-extracted: 1 detections for http

Tamper1 detections

Auto-extracted: 1 detections for tamper

Http1 detections

Auto-extracted: 1 detections for http

Tamper1 detections

Auto-extracted: 1 detections for tamper

Process Access Monitoring1 detections

Auto-extracted: 1 detections for process access monitoring

DETECTIONS (26)