https://attack.mitre.org/techniques/T1562/002/
attackers may disable windows event logging to limit data that can be leveraged for detections and audits. windows event logs record user and system activity such as login attempts, process creation, and much more. this data is used by the security tools and analysts to generate detections.
the eventlog service maintains event logs from various system components and applications. by default the service automatically starts when a system powers on.
an audit policy which is maintained by the local security policy (secpol.msc) defines which system events the eventlog service logs.
security audit policy can be changed by running secpol.msc, then navigating to security settings\local policies\audit policy for basic audit policy setting or security settings\advanced audit policy configuration for advanced audit policy configuration.
command line is auditpol.exe to set audit policies.
adversaries may disable event log service by typing the following command:
Stop-Service -Name EventLog
auditpol command can be used inline to disable auditing or clear the audit policy.
attacker may use /succes or /failure parameters to enable or disable a specified setting or audit categoty.
auditpol /set /category:"Account Logon" /success:disable /failure:disable
clearing audit policy:
auditpol /clear /y or auditpol /remove /allusers
Comments
Post a Comment