Rule Library

Sigma Rules

794 rules found for "Microsoft"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Deployment Of The AppX Package Was Blocked By The Policy

Detects an appx package deployment that was blocked by the local computer policy. The following events indicate that an AppX package deployment was blocked by a policy: - Event ID 441: The package deployment operation is blocked by the "Allow deployment operations in special profiles" policy - Event ID 442: Deployments to non-system volumes are blocked by the "Disable deployment of Windows Store apps to non-system volumes" policy." - Event ID 453: Package blocked by a platform policy. - Event ID 454: Package blocked by a platform policy.

Windowsappxdeployment-server
TA0005 · Defense Evasion
François HubautWed Jan 11windows
Detectionmediumtest

AppX Located in Uncommon Directory Added to Deployment Pipeline

Detects an appx package that was added to the pipeline of the "to be processed" packages that is located in uncommon locations.

Windowsappxdeployment-server
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 11windows
Detectionmediumexperimental

Windows AppX Deployment Unsigned Package Installation

Detects attempts to install unsigned MSIX/AppX packages using the -AllowUnsigned parameter via AppXDeployment-Server events

Windowsappxdeployment-server
TA0005 · Defense EvasionTA0002 · ExecutionT1204.002 · Malicious FileT1553.005 · Mark-of-the-Web Bypass
Michael Haag+1Mon Nov 03windows
Detectionhightest

BITS Transfer Job Download From File Sharing Domains

Detects BITS transfer job downloading files from a file sharing domain.

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
Florian Roth (Nextron Systems)Tue Jun 28windows
Detectionlowexperimental

CodeIntegrity - Unmet Signing Level Requirements By File Under Validation

Detects attempted file load events that did not meet the signing level requirements. It often means the file's signature is revoked or a signature with the Lifetime Signing EKU has expired. This event is best correlated with EID 3089 to determine the error of the validation.

Windowscodeintegrity-operational
TA0002 · Execution
Florian Roth (Nextron Systems)+1Thu Jan 20windows
Detectionhightest

CodeIntegrity - Disallowed File For Protected Processes Has Been Blocked

Detects block events for files that are disallowed by code integrity for protected processes

Windowscodeintegrity-operational
TA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jun 06windows
Detectionhightest

CodeIntegrity - Blocked Image/Driver Load For Policy Violation

Detects blocked load events that did not meet the authenticode signing level requirements or violated the code integrity policy.

Windowscodeintegrity-operational
TA0003 · PersistenceTA0004 · Privilege EscalationT1543 · Create or Modify System Process
Nasreddine Bencherchali (Nextron Systems)Thu Nov 10windows
Detectionhightest

CodeIntegrity - Blocked Driver Load With Revoked Certificate

Detects blocked load attempts of revoked drivers

Windowscodeintegrity-operational
TA0003 · PersistenceTA0004 · Privilege EscalationT1543 · Create or Modify System Process
Nasreddine Bencherchali (Nextron Systems)Tue Jun 06windows
Detectionhightest

CodeIntegrity - Revoked Kernel Driver Loaded

Detects the load of a revoked kernel driver

Windowscodeintegrity-operational
TA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jun 06windows
Detectionhightest

CodeIntegrity - Blocked Image Load With Revoked Certificate

Detects blocked image load events with revoked certificates by code integrity.

Windowscodeintegrity-operational
TA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jun 06windows
Detectionhightest

CodeIntegrity - Revoked Image Loaded

Detects image load events with revoked certificates by code integrity.

Windowscodeintegrity-operational
TA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jun 06windows
Detectionhightest

CodeIntegrity - Unsigned Kernel Module Loaded

Detects the presence of a loaded unsigned kernel module on the system.

Windowscodeintegrity-operational
TA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jun 06windows
Detectionhightest

CodeIntegrity - Unsigned Image Loaded

Detects loaded unsigned image on the system

Windowscodeintegrity-operational
TA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jun 06windows
Detectionhightest

CodeIntegrity - Unmet WHQL Requirements For Loaded Kernel Module

Detects loaded kernel modules that did not meet the WHQL signing requirements.

Windowscodeintegrity-operational
TA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jun 06windows
Detectionmediumtest

Failed DNS Zone Transfer

Detects when a DNS zone transfer failed.

Windowsdns-server
TA0043 · ReconnaissanceT1590.002 · DNS
Zach MathisWed May 24windows
Detectionhightest

DNS Server Error Failed Loading the ServerLevelPluginDLL

Detects a DNS server error in which a specified plugin DLL (in registry) could not be loaded

Windowsdns-server
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Florian Roth (Nextron Systems)Mon May 08windows
Detectionmediumtest

Uncommon New Firewall Rule Added In Windows Firewall Exception List

Detects when a rule has been added to the Windows Firewall exception list

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSat Feb 19windows
Detectionhightest

New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application

Detects the addition of a new rule to the Windows Firewall exception list for an application located in a potentially suspicious location.

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSun Feb 26windows
Detectionhightest

All Rules Have Been Deleted From The Windows Firewall Configuration

Detects when a all the rules have been deleted from the Windows Defender Firewall configuration

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François Hubaut+1Tue Jan 17windows
Detectionmediumtest

A Rule Has Been Deleted From The Windows Firewall Exception List

Detects when a single rules or all of the rules have been deleted from the Windows Defender Firewall

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSat Feb 19windows
Detectionlowtest

The Windows Defender Firewall Service Failed To Load Group Policy

Detects activity when The Windows Defender Firewall service failed to load Group Policy

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSat Feb 19windows
Detectionlowtest

Windows Defender Firewall Has Been Reset To Its Default Configuration

Detects activity when Windows Defender Firewall has been reset to its default configuration

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSat Feb 19windows
Detectionlowtest

Windows Firewall Settings Have Been Changed

Detects activity when the settings of the Windows firewall have been changed

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François Hubaut+1Sat Feb 19windows
Detectionmediumtest

ETW Logging/Processing Option Disabled On IIS Server

Detects changes to of the IIS server configuration in order to disable/remove the ETW logging/processing option.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
François Hubaut+1Sun Oct 06windows
Detectionhightest

HTTP Logging Disabled On IIS Server

Detects changes to of the IIS server configuration in order to disable HTTP logging for successful requests.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
François HubautSun Oct 06windows
Detectionmediumtest

New Module Module Added To IIS Server

Detects the addition of a new module to an IIS server.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
François HubautSun Oct 06windows
Detectionlowtest

Previously Installed IIS Module Was Removed

Detects the removal of a previously installed IIS module.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
Nasreddine Bencherchali (Nextron Systems)Sun Oct 06windows
Detectionmediumtest

Potential Active Directory Reconnaissance/Enumeration Via LDAP

Detects potential Active Directory enumeration via LDAP

Windowsldap
TA0007 · DiscoveryT1069.002 · Domain GroupsT1087.002 · Domain AccountT1482 · Domain Trust Discovery
Adeem MawaniTue Jun 22windows
Detectionmediumtest

Standard User In High Privileged Group

Detect standard users login that are part of high privileged groups such as the Administrator group

Windowslsa-server
TA0006 · Credential AccessTA0004 · Privilege Escalation
François HubautFri Jan 13windows
Detectionmediumtest

MSExchange Transport Agent Installation - Builtin

Detects the Installation of a Exchange Transport Agent

Windowsmsexchange-management
TA0003 · PersistenceT1505.002 · Transport Agent
Tobias MichalskiTue Jun 08windows
Detectionhightest

Failed MSExchange Transport Agent Installation

Detects a failed installation of a Exchange Transport Agent

Windowsmsexchange-management
TA0003 · PersistenceT1505.002 · Transport Agent
Tobias MichalskiTue Jun 08windows
Detectionmediumtest

OpenSSH Server Listening On Socket

Detects scenarios where an attacker enables the OpenSSH server and server starts to listening on SSH socket.

Windowsopenssh
TA0008 · Lateral MovementT1021.004 · SSH
mdecrevoisierTue Oct 25windows
Detectionmediumtest

Failed Logon From Public IP

Detects a failed logon attempt from a public IP. A login from a public IP can indicate a misconfigured firewall or network boundary.

Windowssecurity
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · Persistence+3
NVISOWed May 06windows
Detectionmediumtest

Azure AD Health Monitoring Agent Registry Keys Access

This detection uses Windows security events to detect suspicious access attempts to the registry key of Azure AD Health monitoring agent. This detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object HKLM\SOFTWARE\Microsoft\Microsoft Online\Reporting\MonitoringAgent.

Windowssecurity
TA0007 · DiscoveryT1012 · Query Registry
Roberto Rodriguez (Cyb3rWard0g)+2Thu Aug 26windows
Detectionmediumtest

Azure AD Health Service Agents Registry Keys Access

This detection uses Windows security events to detect suspicious access attempts to the registry key values and sub-keys of Azure AD Health service agents (e.g AD FS). Information from AD Health service agents can be used to potentially abuse some of the features provided by those services in the cloud (e.g. Federation). This detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object: HKLM:\SOFTWARE\Microsoft\ADHealthAgent. Make sure you set the SACL to propagate to its sub-keys.

Windowssecurity
TA0007 · DiscoveryT1012 · Query Registry
Roberto Rodriguez (Cyb3rWard0g)+2Thu Aug 26windows
Detectionmediumtest

Potential AD User Enumeration From Non-Machine Account

Detects read access to a domain user from a non-machine account

Windowssecurity
TA0007 · DiscoveryT1087.002 · Domain Account
Maxime ThiebautMon Mar 30windows
Detectionlowtest

Add or Remove Computer from DC

Detects the creation or removal of a computer. Can be used to detect attacks such as DCShadow via the creation of a new SPN.

Windowssecurity
TA0005 · Defense Evasionattack.t1207
François HubautFri Oct 14windows
Detectionlowtest

Access To ADMIN$ Network Share

Detects access to ADMIN$ network share

Windowssecurity
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Florian Roth (Nextron Systems)Sat Mar 04windows
Detectionhightest

Active Directory User Backdoors

Detects scenarios where one can control another users or computers account without having to use their credentials.

Windowssecurity
TA0004 · Privilege EscalationT1098 · Account ManipulationTA0003 · Persistence
@neu5ronThu Apr 13windows
Detectionhightest

Hacktool Ruler

This events that are generated when using the hacktool Ruler by Sensepost

Windowssecurity
TA0005 · Defense EvasionTA0007 · DiscoveryTA0002 · ExecutionTA0009 · Collection+5
Florian Roth (Nextron Systems)Wed May 31windows
Detectioninformationalstable

Failed Code Integrity Checks

Detects code integrity failures such as missing page hashes or corrupted drivers due unauthorized modification. This could be a sign of tampered binaries.

Windowssecurity
TA0005 · Defense EvasionT1027.001 · Binary Padding
Thomas PatzkeTue Dec 03windows
Detectionhightest

Mimikatz DC Sync

Detects Mimikatz DC sync security events

Windowssecurity
TA0006 · Credential AccessS0002 · MimikatzT1003.006 · DCSync
Benjamin Delpy+3Sun Jun 03windows
Detectionmediumtest

Device Installation Blocked

Detects an installation of a device that is forbidden by the system policy

Windowssecurity
TA0001 · Initial AccessT1200 · Hardware Additions
François HubautFri Oct 14windows
Detectionhightest

ETW Logging Disabled In .NET Processes - Registry

Potential adversaries stopping ETW providers recording loaded .NET assemblies.

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify RegistryT1562 · Impair Defenses
Roberto Rodriguez (Cyb3rWard0g)+1Fri Jun 05windows
Detectionlowtest

External Disk Drive Or USB Storage Device Was Recognized By The System

Detects external disk drives or plugged-in USB devices.

Windowssecurity
T1091 · Replication Through Removable MediaT1200 · Hardware AdditionsTA0008 · Lateral MovementTA0001 · Initial Access
Keith WrightWed Nov 20windows
Detectionmediumtest

Password Policy Enumerated

Detects when the password policy is enumerated.

Windowssecurity
TA0007 · DiscoveryT1201 · Password Policy Discovery
Zach MathisFri May 19windows
Detectionhightest

Replay Attack Detected

Detects possible Kerberos Replay Attack on the domain controllers when "KRB_AP_ERR_REPEAT" Kerberos response is sent to the client

Windowssecurity
TA0006 · Credential AccessT1558 · Steal or Forge Kerberos Tickets
François HubautFri Oct 14windows
Detectionmediumtest

Potential Secure Deletion with SDelete

Detects files that have extensions commonly seen while SDelete is used to wipe files.

Windowssecurity
TA0040 · ImpactTA0005 · Defense EvasionT1070.004 · File DeletionT1027.005 · Indicator Removal from Tools+3
Thomas PatzkeWed Jun 14windows