Microsoft-Windows-Windows Defender
94 events across 2 channels
Event ID 101 — Microsoft Defender Antivirus state updated to %1.
Message
Fields
| Name | Description |
|---|---|
hc_stateid | — |
References
Event ID 1000 — %1 scan has started.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Product Version | — |
Scan ID | — |
Scan Type Index | — |
Scan Type | — |
Scan Parameters Index | — |
Scan Parameters | — |
Domain | — |
User | — |
SID | — |
Scan Resources | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 1000
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2022-04-07T17:03:12.968279+00:00'
event_record_id: 32
correlation: {}
execution:
process_id: 2680
thread_id: 2860
channel: Microsoft-Windows-Windows Defender/Operational
computer: WIN-FPV0DSIC9O6.sigma.fr
security:
user_id: S-1-5-18
event_data:
Product Name: Microsoft Defender Antivirus
Product Version: 4.18.2104.5
Scan ID: '{CE345D2C-02E3-48B3-8683-BF64336A98E7}'
Scan Type Index: '1'
Scan Type: Antimalware
Scan Parameters Index: '1'
Scan Parameters: Quick Scan
Domain: NT AUTHORITY
User: SYSTEM
SID: S-1-5-18
Scan Resources: ''
message: ''
References
Event ID 1001 — %1 scan has finished.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Product Version | — |
Scan ID | — |
Scan Type Index | — |
Scan Type | — |
Scan Parameters Index | — |
Scan Parameters | — |
Domain | — |
User | — |
SID | — |
Scan Time Hours | — |
Scan Time Minutes | — |
Scan Time Seconds | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 1001
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2022-04-04T14:09:02.003645+00:00'
event_record_id: 102
correlation:
ActivityID: 5F56C890-B44B-432D-8EF6-FB4D94734C2D
execution:
process_id: 1796
thread_id: 3036
channel: Microsoft-Windows-Windows Defender/Operational
computer: WIN-TKC15D7KHUR
security:
user_id: S-1-5-18
event_data:
Product Name: Microsoft Defender Antivirus
Product Version: 4.18.2202.4
Scan ID: '{7749FCE9-BEE7-43EC-991B-C0ADC46B93C1}'
Scan Type Index: '1'
Scan Type: Antimalware
Scan Parameters Index: '1'
Scan Parameters: Quick Scan
Domain: WIN-TKC15D7KHUR
User: Administrator
SID: S-1-5-21-1958040314-2592322477-2606035944-500
Scan Time Hours: '0'
Scan Time Minutes: '02'
Scan Time Seconds: '25'
message: ''
References
Event ID 1002 — %1 scan has been stopped before completion.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Product Version | — |
Scan ID | — |
Scan Type Index | — |
Scan Type | — |
Scan Parameters Index | — |
Scan Parameters | — |
Domain | — |
User | — |
SID | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 1002
version: 0
level: 3
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2022-04-07T17:04:28.116951+00:00'
event_record_id: 33
correlation: {}
execution:
process_id: 2680
thread_id: 2860
channel: Microsoft-Windows-Windows Defender/Operational
computer: WIN-FPV0DSIC9O6.sigma.fr
security:
user_id: S-1-5-18
event_data:
Product Name: Microsoft Defender Antivirus
Product Version: 4.18.2104.5
Scan ID: '{CE345D2C-02E3-48B3-8683-BF64336A98E7}'
Scan Type Index: '1'
Scan Type: Antimalware
Scan Parameters Index: '1'
Scan Parameters: Quick Scan
Domain: NT AUTHORITY
User: SYSTEM
SID: S-1-5-18
message: ''
References
Event ID 1003 — %1 scan has been paused.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
ScanID | — |
ScanTypeIndex | — |
ScanType | — |
ScanParametersIndex | — |
ScanParameters | — |
Domain | — |
User | — |
SID | — |
References
Event ID 1004 — %1 scan has resumed.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
ScanID | — |
ScanTypeIndex | — |
ScanType | — |
ScanParametersIndex | — |
ScanParameters | — |
Domain | — |
User | — |
SID | — |
References
Event ID 1005 — %1 scan has encountered an error and terminated.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
ScanID | — |
ScanTypeIndex | — |
ScanType | — |
ScanParametersIndex | — |
ScanParameters | — |
Domain | — |
User | — |
SID | — |
ErrorCode | — |
ErrorDescription | — |
References
Event ID 1006 — %1 has detected malware or other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
DetectionID | — |
DetectionSourceIndex | — |
DetectionSource | — |
Unused | — |
ProcessName | — |
Domain | — |
User | — |
SID | — |
ThreatName | — |
ThreatID | — |
SeverityID | — |
CategoryID | — |
FWLink | — |
PathFound | — |
DetectionOriginIndex | — |
DetectionOrigin | — |
ExecutionStatusIndex | — |
ExecutionStatus | — |
DetectionTypeIndex | — |
DetectionType | — |
Unused2 | — |
Unused3 | — |
SeverityName | — |
CategoryName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
Sigma Rules
- Windows Defender Threat Detected
Detects actions taken by Windows Defender malware detection engines
References
Event ID 1007 — %1 has taken action to protect this machine from malware or other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
DetectionID | — |
Unused | — |
Unused2 | — |
StatusCode | — |
StatusDescription | — |
Domain | — |
User | — |
SID | — |
ThreatName | — |
ThreatID | — |
SeverityID | — |
CategoryID | — |
FWLink | — |
Path | — |
Unused3 | — |
Unused4 | — |
CleaningActionIndex | — |
CleaningAction | — |
Unused5 | — |
Unused6 | — |
Unused7 | — |
Unused8 | — |
SeverityName | — |
CategoryName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
References
Event ID 1008 — %1 has encountered an error when taking action on malware or other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
DetectionID | — |
Unused | — |
Unused2 | — |
StatusCode | — |
StatusDescription | — |
Domain | — |
User | — |
SID | — |
ThreatName | — |
ThreatID | — |
SeverityID | — |
CategoryID | — |
FWLink | — |
Path | — |
Unused3 | — |
Unused4 | — |
CleaningActionIndex | — |
CleaningAction | — |
ErrorCode | — |
ErrorDescription | — |
Unused5 | — |
Unused6 | — |
SeverityName | — |
CategoryName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
References
Event ID 1009 — %1 has restored an item from quarantine.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
Unused2 | — |
Unused3 | — |
Unused4 | — |
Unused5 | — |
Domain | — |
User | — |
SID | — |
ThreatName | — |
ThreatID | — |
SeverityID | — |
CategoryID | — |
FWLink | — |
Path | — |
Unused6 | — |
Unused7 | — |
Unused8 | — |
Unused9 | — |
Unused10 | — |
Unused11 | — |
Unused12 | — |
Unused13 | — |
SeverityName | — |
CategoryName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
Sigma Rules
- Win Defender Restored Quarantine File
Detects the restoration of files from the defender quarantine
References
Event ID 1010 — %1 has encountered an error trying to restore an item from quarantine.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
ErrorCode | — |
ErrorDescription | — |
Unused | — |
Unused2 | — |
Unused3 | — |
Domain | — |
User | — |
SID | — |
ThreatName | — |
ThreatID | — |
SeverityID | — |
CategoryID | — |
FWLink | — |
Path | — |
Unused4 | — |
Unused5 | — |
Unused6 | — |
Unused7 | — |
Unused8 | — |
Unused9 | — |
Unused10 | — |
Unused11 | — |
SeverityName | — |
CategoryName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
References
Event ID 1011 — %1 has deleted an item from quarantine.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
Unused2 | — |
Unused3 | — |
Unused4 | — |
Unused5 | — |
Domain | — |
User | — |
SID | — |
ThreatName | — |
ThreatID | — |
SeverityID | — |
CategoryID | — |
FWLink | — |
Path | — |
Unused6 | — |
Unused7 | — |
Unused8 | — |
Unused9 | — |
Unused10 | — |
Unused11 | — |
Unused12 | — |
Unused13 | — |
SeverityName | — |
CategoryName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
References
Event ID 1012 — %1 has encountered an error trying to delete an item from quarantine.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
ErrorCode | — |
ErrorDescription | — |
Unused | — |
Unused2 | — |
Unused3 | — |
Domain | — |
User | — |
SID | — |
ThreatName | — |
ThreatID | — |
SeverityID | — |
CategoryID | — |
FWLink | — |
Path | — |
Unused4 | — |
Unused5 | — |
Unused6 | — |
Unused7 | — |
Unused8 | — |
Unused9 | — |
Unused10 | — |
Unused11 | — |
SeverityName | — |
CategoryName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
References
Event ID 1013 — %1 has removed history of malware and other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Timestamp | — |
Unused | — |
Unused2 | — |
Unused3 | — |
Unused4 | — |
Domain | — |
User | — |
SID | — |
Sigma Rules
- Windows Defender Malware Detection History Deletion
Windows Defender logs when the history of detected infections is deleted.
References
Event ID 1014 — %1 has encountered an error trying to remove history of malware and other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Timestamp | — |
ErrorCode | — |
ErrorDescription | — |
Unused | — |
Unused2 | — |
Domain | — |
User | — |
SID | — |
References
Event ID 1015 — %1 has detected a suspicious behavior.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
DetectionID | — |
DetectionSourceIndex | — |
DetectionSource | — |
Unused | — |
ProcessName | — |
Domain | — |
User | — |
SID | — |
ThreatName | — |
ThreatID | — |
SeverityID | — |
CategoryID | — |
FWLink | — |
PathFound | — |
DetectionOriginIndex | — |
DetectionOrigin | — |
ExecutionStatusIndex | — |
ExecutionStatus | — |
DetectionTypeIndex | — |
DetectionType | — |
Unused2 | — |
Unused3 | — |
SeverityName | — |
CategoryName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
ProcessID | — |
SecurityintelligenceID | — |
FidelityValue | — |
FidelityLabel | — |
ImageFileHash | — |
Unused4 | — |
Unused5 | — |
TargetFileName | — |
TargetFileHash | — |
Sigma Rules
- Windows Defender Threat Detected
Detects actions taken by Windows Defender malware detection engines
References
Event ID 1116 — %1 has detected malware or other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Product Version | — |
Detection ID | — |
Detection Time | — |
Unused | — |
Unused2 | — |
Threat ID | — |
Threat Name | — |
Severity ID | — |
Severity Name | — |
Category ID | — |
Category Name | — |
FWLink | — |
Status Code | — |
Status Description | — |
State | — |
Source ID | — |
Source Name | — |
Process Name | — |
Detection User | — |
Unused3 | — |
Path | — |
Origin ID | — |
Origin Name | — |
Execution ID | — |
Execution Name | — |
Type ID | — |
Type Name | — |
Pre Execution Status | — |
Action ID | — |
Action Name | — |
Unused4 | — |
Error Code | — |
Error Description | — |
Unused5 | — |
Post Clean Status | — |
Additional Actions ID | — |
Additional Actions String | — |
Remediation User | — |
Unused6 | — |
Signature Version | — |
Engine Version | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 1116
version: 0
level: 3
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2019-07-18T20:51:50.798995+00:00'
event_record_id: 102
correlation:
ActivityID: 40013F0F-EF76-4940-A8B2-4DE50BE9AAC3
execution:
process_id: 6024
thread_id: 6068
channel: Microsoft-Windows-Windows Defender/Operational
computer: MSEDGEWIN10
security:
user_id: S-1-5-18
event_data:
Product Name: '%%827'
Product Version: 4.18.1906.3
Detection ID: '{37522D93-EBDD-4A5B-93B6-E984C9E3FD38}'
Detection Time: '2019-07-18T20:40:16.697Z'
Unused: ''
Unused2: ''
Threat ID: '2147708292'
Threat Name: HackTool:JS/Jsprat
Severity ID: '4'
Severity Name: High
Category ID: '34'
Category Name: Tool
FWLink: https://go.microsoft.com/fwlink/?linkid=37020&name=HackTool:JS/Jsprat&threatid=2147708292&enterprise=0
Status Code: '1'
Status Description: ''
State: '1'
Source ID: '3'
Source Name: '%%818'
Process Name: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Detection User: MSEDGEWIN10\IEUser
Unused3: ''
Path: containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp;
file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005);
file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037);
file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045);
file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065);
file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068)
Origin ID: '1'
Origin Name: '%%845'
Execution ID: '1'
Execution Name: '%%813'
Type ID: '8'
Type Name: '%%862'
Pre Execution Status: '0'
Action ID: '9'
Action Name: '%%887'
Unused4: ''
Error Code: '0x00000000'
Error Description: 'The operation completed successfully. '
Unused5: ''
Post Clean Status: '0'
Additional Actions ID: '0'
Additional Actions String: No additional actions required
Remediation User: ''
Unused6: ''
Signature Version: 'AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0'
Engine Version: 'AM: 1.1.16100.4, NIS: 0.0.0.0'
message: ''
Sigma Rules
- Windows Defender AMSI Trigger Detected
Detects triggering of AMSI by Windows Defender. - Windows Defender Threat Detected
Detects actions taken by Windows Defender malware detection engines
References
- Example event sourced from https://github.com/Yamato-Security/hayabusa-sample-evtx
- RULER Project https://ruler-project.github.io/ruler-project/RULER/av/Microsoft%20Defender/
Event ID 1117 — %1 has taken action to protect this machine from malware or other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Product Version | — |
Detection ID | — |
Detection Time | — |
Unused | — |
Unused2 | — |
Threat ID | — |
Threat Name | — |
Severity ID | — |
Severity Name | — |
Category ID | — |
Category Name | — |
FWLink | — |
Status Code | — |
Status Description | — |
State | — |
Source ID | — |
Source Name | — |
Process Name | — |
Detection User | — |
Unused3 | — |
Path | — |
Origin ID | — |
Origin Name | — |
Execution ID | — |
Execution Name | — |
Type ID | — |
Type Name | — |
Pre Execution Status | — |
Action ID | — |
Action Name | — |
Unused4 | — |
Error Code | — |
Error Description | — |
Unused5 | — |
Post Clean Status | — |
Additional Actions ID | — |
Additional Actions String | — |
Remediation User | — |
Unused6 | — |
Signature Version | — |
Engine Version | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 1117
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2019-07-18T20:53:31.952569+00:00'
event_record_id: 106
correlation:
ActivityID: 2AD0CF94-C382-4568-A488-1253A4ED0F54
execution:
process_id: 6024
thread_id: 6068
channel: Microsoft-Windows-Windows Defender/Operational
computer: MSEDGEWIN10
security:
user_id: S-1-5-18
event_data:
Product Name: '%%827'
Product Version: 4.18.1906.3
Detection ID: '{8791B1FB-0FE7-412E-B084-524CB5A221F3}'
Detection Time: '2019-07-18T20:40:13.775Z'
Unused: ''
Unused2: ''
Threat ID: '2147735426'
Threat Name: Trojan:XML/Exeselrun.gen!A
Severity ID: '5'
Severity Name: Severe
Category ID: '8'
Category Name: Trojan
FWLink: https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:XML/Exeselrun.gen!A&threatid=2147735426&enterprise=0
Status Code: '5'
Status Description: ''
State: '2'
Source ID: '3'
Source Name: '%%818'
Process Name: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Detection User: MSEDGEWIN10\IEUser
Unused3: ''
Path: file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl
Origin ID: '1'
Origin Name: '%%845'
Execution ID: '1'
Execution Name: '%%813'
Type ID: '2'
Type Name: '%%823'
Pre Execution Status: '0'
Action ID: '6'
Action Name: '%%811'
Unused4: ''
Error Code: '0x80508023'
Error Description: 'The program could not find the malware and other potentially
unwanted software on this device. '
Unused5: ''
Post Clean Status: '0'
Additional Actions ID: '0'
Additional Actions String: No additional actions required
Remediation User: NT AUTHORITY\SYSTEM
Unused6: ''
Signature Version: 'AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0'
Engine Version: 'AM: 1.1.16100.4, NIS: 0.0.0.0'
message: ''
Sigma Rules
- Windows Defender Threat Detected
Detects actions taken by Windows Defender malware detection engines
References
- Example event sourced from https://github.com/Yamato-Security/hayabusa-sample-evtx
- RULER Project https://ruler-project.github.io/ruler-project/RULER/av/Microsoft%20Defender/
Event ID 1118 — %1 has encountered a non-critical error when taking action on malware or other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
DetectionID | — |
DetectionTime | — |
Unused | — |
Unused2 | — |
ThreatID | — |
ThreatName | — |
SeverityID | — |
SeverityName | — |
CategoryID | — |
CategoryName | — |
FWLink | — |
StatusCode | — |
StatusDescription | — |
State | — |
SourceID | — |
SourceName | — |
ProcessName | — |
DetectionUser | — |
Unused3 | — |
Path | — |
OriginID | — |
OriginName | — |
ExecutionID | — |
ExecutionName | — |
TypeID | — |
TypeName | — |
PreExecutionStatus | — |
ActionID | — |
ActionName | — |
Unused4 | — |
ErrorCode | — |
ErrorDescription | — |
Unused5 | — |
PostCleanStatus | — |
AdditionalActionsID | — |
AdditionalActionsString | — |
RemediationUser | — |
Unused6 | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
References
Event ID 1119 — %1 has encountered a critical error when taking action on malware or other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
DetectionID | — |
DetectionTime | — |
Unused | — |
Unused2 | — |
ThreatID | — |
ThreatName | — |
SeverityID | — |
SeverityName | — |
CategoryID | — |
CategoryName | — |
FWLink | — |
StatusCode | — |
StatusDescription | — |
State | — |
SourceID | — |
SourceName | — |
ProcessName | — |
DetectionUser | — |
Unused3 | — |
Path | — |
OriginID | — |
OriginName | — |
ExecutionID | — |
ExecutionName | — |
TypeID | — |
TypeName | — |
PreExecutionStatus | — |
ActionID | — |
ActionName | — |
Unused4 | — |
ErrorCode | — |
ErrorDescription | — |
Unused5 | — |
PostCleanStatus | — |
AdditionalActionsID | — |
AdditionalActionsString | — |
RemediationUser | — |
Unused6 | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
References
Event ID 1120 — %1 has deduced the hashes for a threat resource.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
Threatresourcepath | — |
Hashes | — |
References
Event ID 1121 — Microsoft Defender Exploit Guard has blocked an operation that is not allowed by your IT administrator.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
ID | — |
DetectionTime | — |
User | — |
Path | — |
ProcessName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
RuleType | — |
TargetCommandline | — |
ParentCommandline | — |
InvolvedFile | — |
InhertianceFlags | — |
Sigma Rules
- LSASS Access Detected via Attack Surface Reduction
Detects Access to LSASS Process - PSExec and WMI Process Creations Block
Detects blocking of process creations originating from PSExec and WMI commands
References
Event ID 1122 — Microsoft Defender Exploit Guard audited an operation that is not allowed by your IT administrator.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
ID | — |
DetectionTime | — |
User | — |
Path | — |
ProcessName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
RuleType | — |
TargetCommandline | — |
ParentCommandline | — |
InvolvedFile | — |
InhertianceFlags | — |
References
Event ID 1123 — %8 has been blocked from modifying %7 by Controlled Folder Access.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
ID | — |
DetectionTime | — |
User | — |
Path | — |
ProcessName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
References
Event ID 1124 — %8 would have been blocked from modifying %7 by Controlled Folder Access.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
ID | — |
DetectionTime | — |
User | — |
Path | — |
ProcessName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
References
Event ID 1125 — Your IT administrator would have caused Microsoft Defender Exploit Guard to block a potentially dangerous network connection.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
ID | — |
DetectionTime | — |
User | — |
Destination | — |
ProcessName | — |
References
Event ID 1126 — Your IT administrator has caused Microsoft Defender Exploit Guard to block a potentially dangerous network connection.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
ID | — |
DetectionTime | — |
User | — |
Destination | — |
ProcessName | — |
References
Event ID 1127 — Controlled Folder Access blocked %8 from making changes to memory.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
ID | — |
DetectionTime | — |
User | — |
Path | — |
ProcessName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
References
Event ID 1128 — Controlled Folder Access would have blocked %8 from making changes to memory.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
ID | — |
DetectionTime | — |
User | — |
Path | — |
ProcessName | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
References
Event ID 1129 — A user has allowed a blocked Microsoft Defender Exploit Guard operation.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
ID | — |
User | — |
Path | — |
ProcessName | — |
InvolvedFile | — |
References
Event ID 1130 — {Product Name} blocked a behavior by {Source app}.
Message
References
Event ID 1131 — %1 has blocked an operation that your administrator doesn't allow.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
ID | — |
State | — |
Timestamp | — |
Action | — |
Process | — |
Source | — |
Target | — |
User | — |
SignatureVersion | — |
EngineVersion | — |
References
Event ID 1132 — %1 has audited an operation.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
ID | — |
State | — |
Timestamp | — |
Action | — |
Process | — |
Source | — |
Target | — |
User | — |
SignatureVersion | — |
EngineVersion | — |
References
Event ID 1133 — %1 has blocked an operation that your administrator doesn't allow.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
PolicyVersion | — |
PolicyRuleId | — |
EnforcementLevel | — |
AuditReason | — |
EventTimestamp | — |
ActionType | — |
Process | — |
Source | — |
Target | — |
SessionId | — |
UserSid | — |
SignatureVersion | — |
EngineVersion | — |
References
Event ID 1134 — %1 has audited an operation.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
PolicyVersion | — |
PolicyRuleId | — |
EnforcementLevel | — |
AuditReason | — |
EventTimestamp | — |
ActionType | — |
Process | — |
Source | — |
Target | — |
SessionId | — |
UserSid | — |
SignatureVersion | — |
EngineVersion | — |
References
Event ID 1150 — Endpoint Protection client is up and running in a healthy state.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Platform version | — |
Unused | — |
Engine version | — |
Security intelligence version | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 1150
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-05T23:33:02.683905+00:00'
event_record_id: 136
correlation: {}
execution:
process_id: 3332
thread_id: 4248
channel: Microsoft-Windows-Windows Defender/Operational
computer: WinDev2310Eval
security:
user_id: S-1-5-18
event_data:
Product Name: Microsoft Defender Antivirus
Platform version: 4.18.23090.2008
Unused: ''
Engine version: 1.1.23090.2007
Security intelligence version: 1.399.1311.0
message: ''
References
Event ID 1151 — Endpoint Protection client health report (time in UTC): Platform version: %2 Engine version: %4 Network Realtime Inspection engine version: %5 Anti...
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Platform version | — |
Unused | — |
Engine version | — |
NRI engine version | — |
AV security intelligence version | — |
AS security intelligence version | — |
NRI security intelligence version | — |
RTP state | — |
OA state | — |
IOAV state | — |
BM state | — |
Last AV security intelligence age | — |
Last AS security intelligence age | — |
Last quick scan age | — |
Last full scan age | — |
AV security intelligence creation time | — |
AS security intelligence creation time | — |
Last quick scan start time | — |
Last quick scan end time | — |
Last quick scan source | — |
Last full scan start time | — |
Last full scan end time | — |
Last full scan source | — |
Product status | — |
Latest engine version | — |
Engine up-to-date | — |
Latest platform version | — |
Platform up-to-date | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 1151
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T01:33:02.916969+00:00'
event_record_id: 160
correlation: {}
execution:
process_id: 3332
thread_id: 7940
channel: Microsoft-Windows-Windows Defender/Operational
computer: WinDev2310Eval
security:
user_id: S-1-5-18
event_data:
Product Name: Microsoft Defender Antivirus
Platform version: 4.18.23090.2008
Unused: ''
Engine version: 1.1.23090.2007
NRI engine version: 1.1.23090.2007
AV security intelligence version: 1.399.1311.0
AS security intelligence version: 1.399.1311.0
NRI security intelligence version: 1.399.1311.0
RTP state: Disabled
OA state: Disabled
IOAV state: Disabled
BM state: Disabled
Last AV security intelligence age: '11'
Last AS security intelligence age: '11'
Last quick scan age: '4294967295'
Last full scan age: '4294967295'
AV security intelligence creation time: '2023-10-25T15:24:36Z'
AS security intelligence creation time: '2023-10-25T15:24:36Z'
Last quick scan start time: '1601-01-01T00:00:00Z'
Last quick scan end time: '1601-01-01T00:00:00Z'
Last quick scan source: '0'
Last full scan start time: '1601-01-01T00:00:00Z'
Last full scan end time: '1601-01-01T00:00:00Z'
Last full scan source: '0'
Product status: '0x00080000'
Latest engine version: 1.1.23090.2007
Engine up-to-date: '0'
Latest platform version: 4.18.23090.2008
Platform up-to-date: '1'
message: ''
References
Event ID 1160 — %1 has detected potentially unwanted application(PUA).
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
DetectionID | — |
DetectionTime | — |
Unused | — |
Unused2 | — |
ThreatID | — |
ThreatName | — |
SeverityID | — |
SeverityName | — |
CategoryID | — |
CategoryName | — |
FWLink | — |
StatusCode | — |
StatusDescription | — |
State | — |
SourceID | — |
SourceName | — |
ProcessName | — |
DetectionUser | — |
Unused3 | — |
Path | — |
OriginID | — |
OriginName | — |
ExecutionID | — |
ExecutionName | — |
TypeID | — |
TypeName | — |
PreExecutionStatus | — |
ActionID | — |
ActionName | — |
Unused4 | — |
ErrorCode | — |
ErrorDescription | — |
Unused5 | — |
PostCleanStatus | — |
AdditionalActionsID | — |
AdditionalActionsString | — |
RemediationUser | — |
Unused6 | — |
SecurityintelligenceVersion | — |
EngineVersion | — |
References
Event ID 2000 — %1 security intelligence version updated.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Product Version | — |
Current security intelligence Version | — |
Previous security intelligence Version | — |
Unused | — |
Unused2 | — |
Unused3 | — |
Domain | — |
User | — |
SID | — |
Security intelligence Type Index | — |
Security intelligence Type | — |
Update Type Index | — |
Update Type | — |
Current Engine Version | — |
Previous Engine Version | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 2000
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-10-25T21:44:41.065306+00:00'
event_record_id: 38
correlation: {}
execution:
process_id: 2976
thread_id: 4276
channel: Microsoft-Windows-Windows Defender/Operational
computer: WinDevEval
security:
user_id: S-1-5-18
event_data:
Product Name: Microsoft Defender Antivirus
Product Version: 4.18.2201.11
Current security intelligence Version: 1.399.1311.0
Previous security intelligence Version: 1.321.69.0
Unused: ''
Unused2: ''
Unused3: ''
Domain: NT AUTHORITY
User: SYSTEM
SID: S-1-5-18
Security intelligence Type Index: '2'
Security intelligence Type: AntiSpyware
Update Type Index: '1'
Update Type: Full
Current Engine Version: 1.1.23090.2007
Previous Engine Version: 1.1.17300.4
message: ''
References
Event ID 2001 — %1 has encountered an error trying to update security intelligence.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
CurrentsecurityintelligenceVersion | — |
PrevioussecurityintelligenceVersion | — |
UpdateSourceIndex | — |
UpdateSource | — |
Unused | — |
Domain | — |
User | — |
SID | — |
SecurityintelligenceTypeIndex | — |
SecurityintelligenceType | — |
UpdateTypeIndex | — |
UpdateType | — |
CurrentEngineVersion | — |
PreviousEngineVersion | — |
ErrorCode | — |
ErrorDescription | — |
UpdateStateIndex | — |
UpdateState | — |
SourcePath | — |
References
Event ID 2002 — %1 engine version has been updated.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Product Version | — |
Current Engine Version | — |
Previous Engine Version | — |
Unused | — |
Unused2 | — |
Unused3 | — |
Domain | — |
User | — |
SID | — |
Unused4 | — |
Unused5 | — |
Feature Index | — |
Feature Name | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 2002
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-10-25T21:44:41.062981+00:00'
event_record_id: 36
correlation: {}
execution:
process_id: 2976
thread_id: 4276
channel: Microsoft-Windows-Windows Defender/Operational
computer: WinDevEval
security:
user_id: S-1-5-18
event_data:
Product Name: Microsoft Defender Antivirus
Product Version: 4.18.2201.11
Current Engine Version: 1.1.23090.2007
Previous Engine Version: 1.1.17300.4
Unused: ''
Unused2: ''
Unused3: ''
Domain: NT AUTHORITY
User: SYSTEM
SID: S-1-5-18
Unused4: ''
Unused5: ''
Feature Index: '0'
Feature Name: Antimalware
message: ''
References
Event ID 2003 — %1 has encountered an error trying to update the engine.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
CurrentEngineVersion | — |
PreviousEngineVersion | — |
Unused | — |
Unused2 | — |
Unused3 | — |
Domain | — |
User | — |
SID | — |
ErrorCode | — |
ErrorDescription | — |
UpdateStateIndex | — |
UpdateState | — |
References
Event ID 2004 — %1 has encountered an error trying to update security intelligence and will attempt to revert to a previous version.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
SecurityintelligenceAttemptedIndex | — |
SecurityintelligenceAttempted | — |
ErrorCode | — |
ErrorDescription | — |
Unused | — |
Unused2 | — |
Loadingsecurityintelligenceversion | — |
Loadingengineversion | — |
References
Event ID 2005 — %1 could not load antimalware engine because current platform version is not supported.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
References
Event ID 2006 — %1 has encountered an error trying to update the platform.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
ErrorCode | — |
ErrorDescription | — |
References
Event ID 2007 — %1 will soon require a newer platform version to support future versions of the antimalware engine.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
References
Event ID 2008 — %1 platform update update to %4 is paused due to system activity.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
NewPlatformVersion | — |
References
Event ID 2009 — %1 platform update to %4 has resumed.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
NewPlatformVersion | — |
References
Event ID 2010 — %1 used cloud protection to get additional security intelligence.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Product Version | — |
Current security intelligence Version | — |
Unused | — |
Unused2 | — |
Unused3 | — |
Unused4 | — |
Domain | — |
User | — |
SID | — |
Security intelligence Type Index | — |
Security intelligence Type | — |
Unused5 | — |
Unused6 | — |
Current Engine Version | — |
Unused7 | — |
Unused8 | — |
Unused9 | — |
Unused10 | — |
Unused11 | — |
Unused12 | — |
Cloud protection intelligence Type Index | — |
Cloud protection intelligence Type | — |
Persistence Path | — |
Cloud protection intelligence Version | — |
Cloud protection intelligence Compilation Timestamp | — |
Persistence Limit Type Index | — |
Persistence Limit Type | — |
Persistence Limit Value | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 2010
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T01:34:04.823948+00:00'
event_record_id: 162
correlation: {}
execution:
process_id: 3332
thread_id: 12556
channel: Microsoft-Windows-Windows Defender/Operational
computer: WinDev2310Eval
security:
user_id: S-1-5-18
event_data:
Product Name: Microsoft Defender Antivirus
Product Version: 4.18.23090.2008
Current security intelligence Version: 1.399.1311.0
Unused: ''
Unused2: ''
Unused3: ''
Unused4: ''
Domain: ''
User: ''
SID: ''
Security intelligence Type Index: '0'
Security intelligence Type: ''
Unused5: ''
Unused6: ''
Current Engine Version: 1.1.23090.2007
Unused7: ''
Unused8: ''
Unused9: ''
Unused10: ''
Unused11: ''
Unused12: ''
Cloud protection intelligence Type Index: '1'
Cloud protection intelligence Type: Security intelligence update
Persistence Path: C:\ProgramData\Microsoft\Windows Defender\Scans\RtSigs\data\2c120ea46d796db0984b96884f1a90a8dab2bfe3
Cloud protection intelligence Version: 0.0.0.0
Cloud protection intelligence Compilation Timestamp: 11/6/2023 1:34:04 AM
Persistence Limit Type Index: '2'
Persistence Limit Type: Duration
Persistence Limit Value: '100000'
message: ''
References
Event ID 2011 — %1 used cloud protection to discard obsolete security intelligence updates.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
CurrentsecurityintelligenceVersion | — |
Unused | — |
Unused2 | — |
Unused3 | — |
Unused4 | — |
Domain | — |
User | — |
SID | — |
SecurityintelligenceTypeIndex | — |
SecurityintelligenceType | — |
Unused5 | — |
Unused6 | — |
CurrentEngineVersion | — |
Unused7 | — |
Unused8 | — |
Unused9 | — |
Unused10 | — |
Unused11 | — |
Unused12 | — |
CloudprotectionintelligenceTypeIndex | — |
CloudprotectionintelligenceType | — |
PersistencePath | — |
CloudprotectionintelligenceVersion | — |
CloudprotectionintelligenceCompilationTimestamp | — |
PersistenceLimitTypeIndex | — |
PersistenceLimitType | — |
PersistenceLimitValue | — |
RemovalReasonIndex | — |
RemovalReasonValue | — |
References
Event ID 2012 — %1 has encountered an error trying to use cloud protection.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
CurrentsecurityintelligenceVersion | — |
Unused | — |
Unused2 | — |
Unused3 | — |
Unused4 | — |
Domain | — |
User | — |
SID | — |
SecurityintelligenceTypeIndex | — |
SecurityintelligenceType | — |
Unused5 | — |
Unused6 | — |
CurrentEngineVersion | — |
Unused7 | — |
ErrorCode | — |
ErrorDescription | — |
Unused8 | — |
Unused9 | — |
Unused10 | — |
CloudprotectionintelligenceTypeIndex | — |
CloudprotectionintelligenceType | — |
PersistencePath | — |
CloudprotectionintelligenceVersion | — |
CloudprotectionintelligenceCompilationTimestamp | — |
PersistenceLimitTypeIndex | — |
PersistenceLimitType | — |
PersistenceLimitValue | — |
References
Event ID 2013 — %1 discarded all cloud protection intelligence.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
CurrentsecurityintelligenceVersion | — |
Unused | — |
Unused2 | — |
Unused3 | — |
Unused4 | — |
Domain | — |
User | — |
SID | — |
SecurityintelligenceTypeIndex | — |
SecurityintelligenceType | — |
Unused5 | — |
Unused6 | — |
CurrentEngineVersion | — |
References
Event ID 2014 — %1 platform update to %2 has succeeded.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Product Version | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 2014
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-10-25T21:49:53.778165+00:00'
event_record_id: 58
correlation: {}
execution:
process_id: 1332
thread_id: 4624
channel: Microsoft-Windows-Windows Defender/Operational
computer: WinDevEval
security:
user_id: S-1-5-18
event_data:
Product Name: Microsoft Defender Antivirus
Product Version: 4.18.23090.2008
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
- RULER Project https://ruler-project.github.io/ruler-project/RULER/av/Microsoft%20Defender/
Event ID 2020 — {Product Name} downloaded a clean file.
Message
Fields
| Name | Description |
|---|---|
Filename | — |
References
Event ID 2021 — {Product Name} has encountered an error trying to download a clean file.
Message
Fields
| Name | Description |
|---|---|
Filename | — |
References
Event ID 2030 — %1 downloaded and configured Microsoft Defender Antivirus (offline scan) to run on the next reboot.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
References
Event ID 2031 — %1 has encountered an error trying to download and configure Microsoft Defender Antivirus (offline scan).
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Unused | — |
ErrorCode | — |
ErrorDescription | — |
References
Event ID 2040 — The support for your operating system will expire shortly.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
Unused | — |
Unused2 | — |
References
Event ID 2041 — The support for your operating system has expired.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
Unused | — |
Unused2 | — |
References
Event ID 2042 — The support for your operating system has expired.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
Unused | — |
Unused2 | — |
References
Event ID 2050 — %1 has uploaded a file for further analysis.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Filename | — |
Sha256 | — |
References
Event ID 2051 — %1 has encountered an error trying to upload a suspicious file for further analysis.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Filename | — |
Sha256 | — |
CurrentsecurityintelligenceVersion | — |
CurrentEngineVersion | — |
ErrorCode | — |
References
Event ID 3000 — {Product Name} Real-Time Protection agents have started.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
User | — |
References
Event ID 3001 — {Product Name}Real-Time Protection agents have stopped.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
User | — |
References
Event ID 3002 — %1 Real-Time Protection feature has encountered an error and failed.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
FeatureName | — |
Reason | — |
ErrorCode | — |
ErrorDescription | — |
FeatureID | — |
Sigma Rules
- Windows Defender Real-Time Protection Failure/Restart
Detects issues with Windows Defender Real-Time Protection features
References
Event ID 3003 — {Product Name} Real-Time Protection checkpoint has encountered an error and failed to start.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
User | — |
Checkpoint | — |
References
Event ID 3004 — {Product Name} Real-Time Protection agent has detected changes.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
User | — |
References
Event ID 3005 — {Product Name} Real-Time Protection agent has taken action to protect this machine from spyware or other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
User | — |
References
Event ID 3006 — {Product Name} Real-Time Protection agent has encountered an error when taking action on spyware or other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
User | — |
References
Event ID 3007 — %1 Real-time Protection feature has restarted.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
FeatureName | — |
Reason | — |
Unused | — |
Unused2 | — |
FeatureID | — |
Sigma Rules
- Windows Defender Real-Time Protection Failure/Restart
Detects issues with Windows Defender Real-Time Protection features
References
Event ID 4000 — {Product Name} AV OnAccess Filter has detected spyware or other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
param2 | — |
param7 | — |
param8 | — |
param1 | — |
References
Event ID 4002 — {param1} AV OnAccess Filter has taken action to protect this machine from detected spyware or other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
param1 | — |
param3 | — |
param8 | — |
param9 | — |
param2 | — |
References
Event ID 4003 — {param1} AV OnAccess Filter has encountered an error when taking action on detected spyware or other potentially unwanted software.
Message
Fields
| Name | Description |
|---|---|
param1 | — |
param3 | — |
param8 | — |
param9 | — |
param2 | — |
References
Event ID 5000 — %1 Real-time Protection scanning for malware and other potentially unwanted software was enabled.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
References
Event ID 5001 — %1 Real-time Protection scanning for malware and other potentially unwanted software was disabled.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Product Version | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 5001
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T00:11:26.945147+00:00'
event_record_id: 150
correlation: {}
execution:
process_id: 3332
thread_id: 9444
channel: Microsoft-Windows-Windows Defender/Operational
computer: WinDev2310Eval
security:
user_id: S-1-5-18
event_data:
Product Name: Microsoft Defender Antivirus
Product Version: 4.18.23090.2008
message: ''
Sigma Rules
- Windows Defender Real-time Protection Disabled
Detects disabling of Windows Defender Real-time Protection. As this event doesn't contain a lot of information on who initiated this action you might want to reduce it to a "medium" level if this occurs too many times in your environment
References
- Microsoft Learn https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus
- Microsoft Learn https://learn.microsoft.com/en-us/defender-endpoint/troubleshoot-microsoft-defender-antivirus
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
- RULER Project https://ruler-project.github.io/ruler-project/RULER/av/Microsoft%20Defender/
Event ID 5002 — {param1} OnAccess scanning for viruses was enabled.
Message
Fields
| Name | Description |
|---|---|
param1 | — |
References
Event ID 5003 — {param1} OnAccess scanning for viruses was disabled.
Message
Fields
| Name | Description |
|---|---|
param1 | — |
References
Event ID 5004 — %1 Real-time Protection feature configuration has changed.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Product Version | — |
Feature Name | — |
Configuration | — |
Unused | — |
Feature ID | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 5004
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-10-25T21:49:40.464437+00:00'
event_record_id: 56
correlation: {}
execution:
process_id: 1004
thread_id: 912
channel: Microsoft-Windows-Windows Defender/Operational
computer: WinDevEval
security:
user_id: S-1-5-18
event_data:
Product Name: Microsoft Defender Antivirus
Product Version: 4.18.2201.11
Feature Name: Network Inspection System
Configuration: '0'
Unused: ''
Feature ID: '9'
message: ''
References
Event ID 5005 — {Product Name} Real-time Protection checkpoint configuration has changed.
Message
Fields
| Name | Description |
|---|---|
Checkpoint | — |
Configuration | — |
References
Event ID 5006 — {param1} OnAccess filter seems to be a unloaded - OnAccess scanning is disabled - Please restart the service.
Message
Fields
| Name | Description |
|---|---|
param1 | — |
References
Event ID 5007 — %1 Configuration has changed.
Message
Fields
| Name | Description |
|---|---|
Product Name | — |
Product Version | — |
Old Value | — |
New Value | — |
Example Event
system:
provider: Microsoft-Windows-Windows Defender
guid: 11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78
event_source_name: ''
event_id: 5007
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T06:25:45.697776+00:00'
event_record_id: 113
correlation: {}
execution:
process_id: 3944
thread_id: 4488
channel: Microsoft-Windows-Windows Defender/Operational
computer: WinDev2310Eval
security:
user_id: S-1-5-18
event_data:
Product Name: Microsoft Defender Antivirus
Product Version: 4.18.23090.2008
Old Value: Default\IsServiceRunning = 0x0
New Value: HKLM\SOFTWARE\Microsoft\Windows Defender\IsServiceRunning = 0x1
message: ''
Sigma Rules
- Windows Defender Exclusions Added
Detects the Setting of Windows Defender Exclusions - Windows Defender Exploit Guard Tamper
Detects when someone is adding or removing applications or folders from exploit guard "ProtectedFolders" or "AllowedApplications" - Windows Defender Submit Sample Feature Disabled
Detects disabling of the "Automatic Sample Submission" feature of Windows Defender. - Windows Defender Configuration Changes
Detects suspicious changes to the Windows Defender configuration
References
- Microsoft Learn https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus
- Microsoft Learn https://learn.microsoft.com/en-us/defender-endpoint/troubleshoot-microsoft-defender-antivirus
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
- RULER Project https://ruler-project.github.io/ruler-project/RULER/av/Microsoft%20Defender/
Event ID 5008 — %1 engine has been terminated due to an unexpected error.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Resource | — |
FailureTypeIndex | — |
FailureType | — |
ExceptionCode | — |
References
Event ID 5009 — %1 scanning for spyware and other potentially unwanted software has been enabled.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
References
Event ID 5010 — %1 scanning for spyware and other potentially unwanted software is disabled.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Sigma Rules
- Windows Defender Malware And PUA Scanning Disabled
Detects disabling of the Windows Defender feature of scanning for malware and other potentially unwanted software
References
Event ID 5011 — %1 scanning for viruses has been enabled.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
References
Event ID 5012 — %1 scanning for viruses is disabled.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Sigma Rules
- Windows Defender Virus Scanning Feature Disabled
Detects disabling of the Windows Defender virus scanning feature
References
Event ID 5013 — Tamper Protection %3 a change to %1.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
ChangedType | — |
Value | — |
Sigma Rules
- Microsoft Defender Tamper Protection Trigger
Detects blocked attempts to change any of Defender's settings such as "Real Time Monitoring" and "Behavior Monitoring"
References
Event ID 5014 — %1 Resource Monitor: Memory consumption exceeded its limit.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
HitCount | — |
Threshold | — |
References
Event ID 5015 — %1 Resource Monitor: CPU utilization exceeded its limit.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
HitCount | — |
Threshold | — |
References
Event ID 5016 — %1 service seemed to be hung during shutdown.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
Timeout | — |
Component | — |
Crashed | — |
References
Event ID 5017 — %1 service feature has encountered an error and failed.
Message
Fields
| Name | Description |
|---|---|
ProductName | — |
ProductVersion | — |
FeatureName | — |
FailureId | — |
FailureReason | — |
Recommendation | — |
ErrorCode | — |
ErrorDescription | — |