Detectionhightest
Security Eventlog Cleared
One of the Windows Eventlogs has been cleared. e.g. caused by "wevtutil cl" command execution
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Florian Roth (Nextron Systems)Created Tue Jan 10Updated Thu Feb 24d99b79d2-0a6f-4f46-ad8b-260b6e17f982windows
Log Source
Windowssecurity
ProductWindows← raw: windows
Servicesecurity← raw: security
Detection Logic
Detection Logic2 selectors
detection:
selection_517:
EventID: 517
Provider_Name: Security
selection_1102:
EventID: 1102
Provider_Name: Microsoft-Windows-Eventlog
condition: 1 of selection_*False Positives
Rollout of log collection agents (the setup routine often includes a reset of the local Eventlog)
System provisioning (system reset before the golden image creation)
MITRE ATT&CK
Tactics
Sub-techniques
CAR Analytics
2016-04-002 · CAR 2016-04-002
Related Rules
Similar
Rule not foundf2f01843-e7b8-4f95-a35a-d23584476423
Similar
Rule not founda122ac13-daf8-4175-83a2-72c387be339d
Rule Metadata
Rule ID
d99b79d2-0a6f-4f46-ad8b-260b6e17f982
Status
test
Level
high
Type
Detection
Created
Tue Jan 10
Modified
Thu Feb 24
Path
rules/windows/builtin/security/win_security_audit_log_cleared.yml
Raw Tags
attack.defense-evasionattack.t1070.001car.2016-04-002