https://attack.mitre.org/techniques/T1562/006/ https://medium.com/palantir/tampering-with-windows-event-tracing-background-offense-and-defense-4be7ac62ac63 synopsis: Attacker always wants to cover their tracks. so they delete or disable windows event logs, audit logs, they even interrupt logging system or agent from the host so the host cannot send their logs to siem. attacker may change the following registry to achieve that: HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AUTOLOGGER_NAME\{Provider_GUID} it can also be done by utilizing some administrative utilities like powershell, windows management instrumentation etc. now the question is how can we know the autologger name, GUID etc? you can know that by navigating to the above registry path. or we can dig deeper the followings: ETW architecture : events providers event tracing sessions event consumers tracing sessions are responsible for collecting events from event providers and relaying them to log files and consume