Detection rules › By event
Microsoft-Windows-Sysmon event 14
Sigma (42)
- Atbroker Registry Change
- CMSTP Execution Registry Event
- Creation of a Local Hidden User Account by Registry
- Delete Defender Scan ShellEx Context Menu Registry Key
- Disable Security Events Logging Adding Reg Key MiniNt
- DLL Load via LSASS
- Esentutl Volume Shadow Copy Service Keys
- Folder Removed From Exploit Guard ProtectedFolders List - Registry
- HybridConnectionManager Service Installation - Registry
- Narrator's Feedback-Hub Persistence
- NetNTLM Downgrade Attack - Registry
- New DLL Added to AppCertDlls Registry Key
- New DLL Added to AppInit_DLLs Registry Key
- New PortProxy Registry Entry Added
- Office Application Startup - Office Test
- Path To Screensaver Binary Modified
- Potential Credential Dumping Via LSASS SilentProcessExit Technique
- Potential Qakbot Registry Activity
- RedMimicry Winnti Playbook Registry Manipulation
- Registry Entries For Azorult Malware
- Registry Persistence Mechanisms in Recycle Bin
- Registry Tampering by Potentially Suspicious Processes
- Removal Of AMSI Provider Registry Keys
- Removal Of Index Value to Hide Schedule Task - Registry
- Removal of Potential COM Hijacking Registry Keys
- Removal Of SD Value to Hide Schedule Task - Registry
- Run Once Task Configuration in Registry
- RunMRU Registry Key Deletion - Registry
- Security Support Provider (SSP) Added to LSA Configuration
- Shell Open Registry Keys Manipulation
- Sticky Key Like Backdoor Usage - Registry
- Suspicious Camera and Microphone Access
- Suspicious Run Key from Download
- Terminal Server Client Connection History Cleared - Registry
- UAC Bypass Via Wsreset
- Wdigest CredGuard Registry Modification
- Windows Credential Editor Registry
- Windows Credential Guard Related Registry Value Deleted - Registry
- Windows Defender Threat Severity Default Action Modified
- Windows Recall Feature Enabled - DisableAIDataAnalysis Value Deleted
- Windows Registry Trust Record Modification
- WINEKEY Registry Modification