


Isolate the involved hosts to prevent further post-compromise behavior. Initiate the incident response process based on the outcome of the triage. Microsoft Windows Defender Tampering - fe794edd-487f-4a90-b285-3ee54f2af2d3 Disabling Windows Defender Security Settings via PowerShell - c8cccb06-faf2-4cd5-886e-2c9636cfcb87 The configuration is justified (for example, it is being used to deploy other security solutions or troubleshooting),Īnd no other suspicious activity has been observed. Analysts can dismiss the alert if the administrator is aware of the activity, This mechanism can be used legitimately. Check if this operation is done under change management and approved according to the organization's policy. Investigate other alerts associated with the user/host during the past 48 hours. Contact the account owner and confirm whether they are aware of this activity. Identify the user account that performed the action and whether it should perform this kind of action. Validate the activity is not related to planned patches, updates, network administrator activity, or legitimate Examine their executable filesįor prevalence, whether they are located in expected locations, and if they are signed with valid digital signatures. Investigate the process execution chain (parent process tree) for unknown processes. This rule monitors the registry for configurations that disable Windows Defender or the start of its service. Disabling it is a common step in threat actor playbooks. Microsoft Windows Defender is an antivirus product built into Microsoft Windows, which makes it popular across multipleĮnvironments. # Investigating Windows Defender Disabled via Registry Modification
