Detection rules › Elastic
Potential Evasion via Windows Filtering Platform
Identifies multiple Windows Filtering Platform block events and where the process name is related to an endpoint security software. Adversaries may add malicious WFP rules to prevent Endpoint security from sending telemetry.
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Defense Evasion | T1562 Impair Defenses, T1562.001 Impair Defenses: Disable or Modify Tools, T1562.004 Impair Defenses: Disable or Modify System Firewall |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Security-Auditing | 5152 | The Windows Filtering Platform blocked a packet. |
| Security-Auditing | 5157 | The Windows Filtering Platform has blocked a connection. |
Stages and Predicates
Stage 1: eql:network
event.action:"windows-firewall-packet-block" and process.name:"bdagent.exe"Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
event.action | wildcard |
|
process.name | wildcard |
|