EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

Disable Security Events Logging Adding Reg Key MiniNt

Detects the addition of a key 'MiniNt' to the registry. Upon a reboot, Windows Event Log service will stop writing events.

T1562.002T1112
Sigmahigh

Disable Security Tools

Detects disabling security tools

T1562.001
Sigmamedium

Disable System Firewall

Detects disabling of system firewalls which could be used by adversaries to bypass controls that limit usage of the network.

T1562.004
Sigmahigh

Disable Tamper Protection on Windows Defender

Detects disabling Windows Defender Tamper Protection

T1562.001
Sigmamedium

Disable Windows Defender AV Security Monitoring

Detects attackers attempting to disable Windows Defender using Powershell

T1562.001
Sigmahigh

Disable Windows Defender Functionalities Via Registry Keys

Detects when attackers or tools disable Windows Defender functionalities via the Windows registry

T1562.001
Sigmahigh

Disable Windows Event Logging Via Registry

Detects tampering with the "Enabled" registry key in order to disable Windows logging of a Windows event channel

T1562.002
Sigmahigh

Disable Windows Firewall by Registry

Detect set EnableFirewall to 0 to disable the Windows firewall

T1562.004
Sigmamedium

Disable Windows IIS HTTP Logging

Disables HTTP logging on a Windows IIS web server as seen by Threat Group 3390 (Bronze Union)

T1562.002
Sigmahigh

Disable Windows Security Center Notifications

Detect set UseActionCenterExperience to 0 to disable the Windows security center notification

T1112
Sigmamedium

Disable-WindowsOptionalFeature Command PowerShell

Detect built in PowerShell cmdlet Disable-WindowsOptionalFeature, Deployment Image Servicing and Management tool. Similar to DISM.exe, this cmdlet is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

T1562.001
Sigmahigh

Disabled IE Security Features

Detects command lines that indicate unwanted modifications to registry keys that disable important Internet Explorer security features

T1562.001
Sigmahigh

Disabled MFA to Bypass Authentication Mechanisms

Detection for when multi factor authentication has been disabled, which might indicate a malicious activity to bypass authentication mechanisms.

T1556
Sigmamedium

Disabled Volume Snapshots

Detects commands that temporarily turn off Volume Snapshots

T1562.001
Sigmahigh

Disabled Windows Defender Eventlog

Detects the disabling of the Windows Defender eventlog as seen in relation to Lockbit 3.0 infections

T1562.001
Sigmahigh

Disabling Multi Factor Authentication

Detects disabling of Multi Factor Authentication.

T1556.006
Sigmahigh

Disabling Security Tools

Detects disabling security tools

T1562.004
Sigmamedium

Disabling Security Tools - Builtin

Detects disabling security tools

T1562.004
Sigmamedium

Disabling Windows Defender WMI Autologger Session via Reg.exe

Detects the use of reg.exe to disable the Event Tracing for Windows (ETW) Autologger session for Windows Defender API and Audit events. By setting the 'Start' value to '0' for the 'DefenderApiLogger' or 'DefenderAuditLogger' session, an attacker can prevent these critical security events from being logged, effectively blinding monitoring tools that rely on this data. This is a powerful defense evasion technique.

T1562.001
Sigmahigh

Discovery of a System Time

Identifies use of various commands to query a systems time. This technique may be used before executing a scheduled task or to discover the time zone of a target system.

T1124
Sigmalow

Discovery Using AzureHound

Detects AzureHound (A BloodHound data collector for Microsoft Azure) activity via the default User-Agent that is used during its operation after successful authentication.

T1087.004T1526
Sigmahigh

Disk Image Creation Via Hdiutil - MacOS

Detects the execution of the hdiutil utility in order to create a disk image.

Sigmamedium

Disk Image Mounting Via Hdiutil - MacOS

Detects the execution of the hdiutil utility in order to mount disk images.

T1566.001T1560.001
Sigmamedium

Diskshadow Child Process Spawned

Detects any child process spawning from "Diskshadow.exe". This could be due to executing Diskshadow in interpreter mode or script mode and using the "exec" flag to launch other applications.

T1218
Sigmamedium
PreviousPage 23 of 136Next