ATT&CK coverage › Technique
Impair Defenses: Disable or Modify Tools T1562.001
Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properly, or other methods to interfere with security tools scanning or reporting information. Adversaries may also disable updates to prevent the latest security patches from reaching tools on victim systems.
Events covered
34 catalog events are tagged with this technique by at least one rule.
Authoring guide
Patterns shared across the 171 rules above: which fields they filter on, what specific values they look for, and what they exclude. Field names are normalized across vendors so Sigma's Image, Elastic's process.name, and Splunk's process_name collapse into one row. Each rule contributes at most once per row.
Fields filtered most (47 distinct)
The fields most rules look at when detecting this technique. The How column shows the operators authors use (eq, wildcard, regex_match, match) and how often each appears. Sample values are concrete examples to start from, not an exhaustive list.
Top indicator values (1404 distinct)
Specific (field, operator, value) combinations the rules check for, ranked by how many rules under this technique use each one. The Corpus reach column counts how many rules across the entire catalog (any technique) check the same combination. High numbers point to widely-used indicators that are likely noisy on their own; combine them with another condition for useful signal. Blank means the combination is specific to rules under this technique.
Common exclusions (1 distinct)
Field/operator/value combinations that rules under this technique routinely exclude (top-level not() clauses). These are the false-positive paths the community has learned to filter out. A new rule that ignores the high-count entries here will likely fire on the same noisy paths.
Rules under this technique
Every rule in the catalog tagged with this technique, grouped by vendor. Click a rule title for its full predicates, exclusions, and indicators.
Sigma 107 rules
- Add SafeBoot Keys Via Reg Utility
- AMSI Bypass Pattern Assembly GetType
- AMSI Disabled via Registry Modification
- Antivirus Filter Driver Disallowed On Dev Drive - Registry
- Devcon Execution Disabling VMware VMCI Device
- Disable Exploit Guard Network Protection on Windows Defender
- Disable Privacy Settings Experience in Registry
- Disable PUA Protection on Windows Defender
- Disable Tamper Protection on Windows Defender
- Disable Windows Defender AV Security Monitoring
- Disable Windows Defender Functionalities Via Registry Keys
- Disable-WindowsOptionalFeature Command PowerShell
- Disabled IE Security Features
- Disabled Volume Snapshots
- Disabled Windows Defender Eventlog
- Disabling Windows Defender WMI Autologger Session via Reg.exe
- Dism Remove Online Package
- Enable Remote Connection Between Anonymous Computer - AllowAnonymousCallback
- Folder Removed From Exploit Guard ProtectedFolders List - Registry
- HackTool - CobaltStrike BOF Injection Pattern
- Hacktool - EDR-Freeze Execution
- HackTool - PowerTool Execution
- HackTool - Stracciatella Execution
- Hypervisor Enforced Paging Translation Disabled
- Hypervisor-protected Code Integrity (HVCI) Related Registry Tampering Via CommandLine
- Load Of RstrtMgr.DLL By A Suspicious Process
- Load Of RstrtMgr.DLL By An Uncommon Process
- Microsoft Defender Tamper Protection Trigger
- Microsoft Malware Protection Engine Crash
- Microsoft Malware Protection Engine Crash - WER
- Microsoft Office Protected View Disabled
- NetNTLM Downgrade Attack
- NetNTLM Downgrade Attack - Registry
- Obfuscated PowerShell OneLiner Execution
- Potential AMSI Bypass Script Using NULL Bits
- Potential AMSI Bypass Using NULL Bits
- Potential AMSI Bypass Via .NET Reflection
- Potential AMSI COM Server Hijacking
- Potential Privileged System Service Operation - SeLoadDriverPrivilege
- Potential Tampering With Security Products Via WMIC
- Powershell Base64 Encoded MpPreference Cmdlet
- Powershell Defender Disable Scan Feature
- Powershell Defender Exclusion
- PowerShell Defender Threat Severity Default Action Set to 'Allow' or 'NoAction'
- PPL Tampering Via WerFaultSecure
- PUA - CleanWipe Execution
- Python Function Execution Security Warning Disabled In Excel
- Python Function Execution Security Warning Disabled In Excel - Registry
- Raccine Uninstall
- Reg Add Suspicious Paths
- Removal Of AMSI Provider Registry Keys
- SafeBoot Registry Key Deleted Via Reg.EXE
- Scripted Diagnostics Turn Off Check Enabled - Registry
- Security Service Disabled Via Reg.EXE
- Service Registry Key Deleted Via Reg.EXE
- Service StartupType Change Via PowerShell Set-Service
- Service StartupType Change Via Sc.EXE
- Suspicious Application Allowed Through Exploit Guard
- Suspicious Loading of Dbgcore/Dbghelp DLLs from Uncommon Location
- Suspicious Path In Keyboard Layout IME File Registry Value
- Suspicious Process Access of MsMpEng by WerFaultSecure - EDR-Freeze
- Suspicious Process Access to LSASS with Dbgcore/Dbghelp DLLs
- Suspicious PROCEXP152.sys File Created In TMP
- Suspicious Service Installed
- Suspicious Uninstall of Windows Defender Feature via PowerShell
- Suspicious Windows Defender Folder Exclusion Added Via Reg.EXE
- Suspicious Windows Defender Registry Key Tampering Via Reg.EXE
- Suspicious Windows Service Tampering
- Suspicious Windows Trace ETW Session Tamper Via Logman.EXE
- Sysinternals PsSuspend Suspicious Execution
- Sysmon Configuration Update
- Sysmon Driver Altitude Change
- Tamper Windows Defender - PSClassic
- Tamper Windows Defender - ScriptBlockLogging
- Tamper Windows Defender Remove-MpPreference
- Tamper Windows Defender Remove-MpPreference - ScriptBlockLogging
- Tamper With Sophos AV Registry Keys
- Taskkill Symantec Endpoint Protection
- Uncommon Extension In Keyboard Layout IME File Registry Value
- Uninstall Crowdstrike Falcon Sensor
- Uninstall Sysinternals Sysmon
- Vulnerable Driver Blocklist Registry Tampering Via CommandLine
- Weak Encryption Enabled and Kerberoast
- Win Defender Restored Quarantine File
- Windows AMSI Related Registry Tampering Via CommandLine
- Windows Credential Guard Disabled - Registry
- Windows Credential Guard Registry Tampering Via CommandLine
- Windows Credential Guard Related Registry Value Deleted - Registry
- Windows Defender Configuration Changes
- Windows Defender Context Menu Removed
- Windows Defender Definition Files Removed
- Windows Defender Exclusion List Modified
- Windows Defender Exclusion Registry Key - Write Access Requested
- Windows Defender Exclusions Added
- Windows Defender Exclusions Added - Registry
- Windows Defender Exploit Guard Tamper
- Windows Defender Grace Period Expired
- Windows Defender Malware And PUA Scanning Disabled
- Windows Defender Real-time Protection Disabled
- Windows Defender Real-Time Protection Failure/Restart
- Windows Defender Service Disabled - Registry
- Windows Defender Submit Sample Feature Disabled
- Windows Defender Threat Detection Service Disabled
- Windows Defender Threat Severity Default Action Modified
- Windows Defender Virus Scanning Feature Disabled
- Windows Hypervisor Enforced Code Integrity Disabled
- Windows Vulnerable Driver Blocklist Disabled
Elastic 1 rule
Splunk 61 rules
- Disable AMSI Through Registry
- Disable Defender AntiVirus Registry
- Disable Defender BlockAtFirstSeen Feature
- Disable Defender Enhanced Notification
- Disable Defender MpEngine Registry
- Disable Defender Spynet Reporting
- Disable Defender Submit Samples Consent Feature
- Disable ETW Through Registry
- Disable Registry Tool
- Disable Show Hidden Files
- Disable Windows App Hotkeys
- Disable Windows Behavior Monitoring
- Disable Windows SmartScreen Protection
- Disabling CMD Application
- Disabling ControlPanel
- Disabling Defender Services
- Disabling FolderOptions Windows Feature
- Disabling NoRun Windows App
- Disabling Task Manager
- Hide User Account From Sign-In Screen
- Powershell Remove Windows Defender Directory
- Powershell Windows Defender Exclusion Commands
- Windows AD Domain Controller Audit Policy Disabled
- Windows AD GPO Deleted
- Windows AD GPO Disabled
- Windows Defender Exclusion Registry Entry
- Windows Disable or Stop Browser Process
- Windows DisableAntiSpyware Registry
- Windows Event For Service Disabled
- Windows Excessive Disabled Services Event
- Windows Impair Defense Change Win Defender Health Check Intervals
- Windows Impair Defense Change Win Defender Quick Scan Interval
- Windows Impair Defense Change Win Defender Throttle Rate
- Windows Impair Defense Change Win Defender Tracing Level
- Windows Impair Defense Configure App Install Control
- Windows Impair Defense Define Win Defender Threat Action
- Windows Impair Defense Delete Win Defender Context Menu
- Windows Impair Defense Delete Win Defender Profile Registry
- Windows Impair Defense Deny Security Software With Applocker
- Windows Impair Defense Disable Controlled Folder Access
- Windows Impair Defense Disable Defender Firewall And Network
- Windows Impair Defense Disable Defender Protocol Recognition
- Windows Impair Defense Disable PUA Protection
- Windows Impair Defense Disable Realtime Signature Delivery
- Windows Impair Defense Disable Web Evaluation
- Windows Impair Defense Disable Win Defender App Guard
- Windows Impair Defense Disable Win Defender Compute File Hashes
- Windows Impair Defense Disable Win Defender Gen reports
- Windows Impair Defense Disable Win Defender Network Protection
- Windows Impair Defense Disable Win Defender Report Infection
- Windows Impair Defense Disable Win Defender Scan On Update
- Windows Impair Defense Disable Win Defender Signature Retirement
- Windows Impair Defense Overide Win Defender Phishing Filter
- Windows Impair Defense Override SmartScreen Prompt
- Windows Impair Defense Set Win Defender Smart Screen Level To Warn
- Windows Impair Defenses Disable Auto Logger Session
- Windows Impair Defenses Disable HVCI
- Windows Impair Defenses Disable Win Defender Auto Logging
- Windows Important Audit Policy Disabled
- Windows Powershell Import Applocker Policy
- Windows Terminating Lsass Process