elastic / detection-rules

https://www.elastic.co/guide/en/security/current/detection-engine-overview.html
Other
1.92k stars 492 forks source link

[New Rule] PowerShell Script with Windows Defender Tampering Capabilities #4075

Closed w0rk3r closed 3 weeks ago

w0rk3r commented 3 weeks ago

Issues

Resolves https://github.com/elastic/detection-rules/issues/2379

Summary

Identifies PowerShell scripts containing cmdlets and parameters that attackers can abuse to disable Windows Defender features. Attackers can tamper with antivirus to reduce the risk of detection when executing their payloads.

protectionsmachine commented 3 weeks ago

Rule: New - Guidelines

These guidelines serve as a reminder set of considerations when proposing a new rule.

Documentation and Context

Rule Metadata Checks

New BBR Rules

Testing and Validation