Detection rules › Sigma

Windows Defender Configuration Changes

Severity
high
Author
Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects suspicious changes to the Windows Defender configuration

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1562.001 Impair Defenses: Disable or Modify Tools

Event coverage

ProviderEvent IDTitle
Windows-Defender5007

Stages and Predicates

Stage 1: selection

or:
NewValue|contains: '\Real-Time Protection\SpyNetReporting '
NewValue|contains: '\Windows Defender\DisableAntiSpyware '
NewValue|contains: '\Windows Defender\Scan\DisableRemovableDriveScanning '
NewValue|contains: '\Windows Defender\Scan\DisableScanningMappedNetworkDrivesForFullScan '
NewValue|contains: '\Windows Defender\SpyNet\DisableBlockAtFirstSeen '

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
NewValuematch
  • \Real-Time Protection\SpyNetReporting
  • \Windows Defender\DisableAntiSpyware
  • \Windows Defender\Scan\DisableRemovableDriveScanning
  • \Windows Defender\Scan\DisableScanningMappedNetworkDrivesForFullScan
  • \Windows Defender\SpyNet\DisableBlockAtFirstSeen