cd

5 min read

MDE - MDE Exclusion Added or Modified

Description

This query will detect changes to MDE exclusion registry paths.

Query

DeviceRegistryEvents 
| where ActionType == "RegistryValueSet"
| where RegistryKey startswith @"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" or RegistryKey startswith @"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions" or RegistryKey startswith @"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes"
| join kind=inner (
    DeviceProcessEvents
    | project 
        ProcessId,
        InitiatingProcessId,
        ProcessCommandLine,
        ProcessVersionInfoCompanyName,
        ProcessVersionInfoFileDescription
) on $left.InitiatingProcessId == $right.ProcessId
| project 
    TimeGenerated,
    DeviceName,
    InitiatingProcessAccountName,
    InitiatingProcessCommandLine,
    RegistryKey,
    RegistryValueData,
    ProcessVersionInfoCompanyName,
    ProcessVersionInfoFileDescription

MITRE ATT&CK

IDTechniqueTactic
T1562.001Impair Defenses: Disable or Modify ToolsDefense Evasion

Analytic Rule

  • Yaml:
  • ARM:

Notes