Detectionmediumstable
Windows Defender Exclusions Added
Detects the Setting of Windows Defender Exclusions
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Christian Burkard (Nextron Systems)Created Tue Jul 06Updated Tue Dec 061321dc4e-a1fe-481d-a016-52c45f0c8b4fwindows
Log Source
Windowswindefend
ProductWindows← raw: windows
Servicewindefend← raw: windefend
Detection Logic
Detection Logic1 selector
detection:
selection:
EventID: 5007 # The antimalware platform configuration changed.
NewValue|contains: '\Microsoft\Windows Defender\Exclusions'
condition: selectionFalse Positives
Administrator actions
References
MITRE ATT&CK
Tactics
Sub-techniques
Rule Metadata
Rule ID
1321dc4e-a1fe-481d-a016-52c45f0c8b4f
Status
stable
Level
medium
Type
Detection
Created
Tue Jul 06
Modified
Tue Dec 06
Path
rules/windows/builtin/windefend/win_defender_config_change_exclusion_added.yml
Raw Tags
attack.defense-evasionattack.t1562.001