Detecting the disabling of security tools
To avoid detection and ensure barrier-free operation during attacks, attackers can use tactics such as modifying the configuration of security tools or disabling them to prevent them from running. These searches look for activity consistent with attackers attempting to disable different security mechanisms.
Required data
Endpoint data that records process activity from your hosts, and logs with both the process name and command line from your endpoints. Use this data to populate the Processes node of the Endpoint data model in the Common Information Model (CIM). For information on installing and using the CIM, see the Common Information Model documentation.
How to use Splunk software for this use case
- Attempt to add certificate to untrusted store
- Attempt to stop security service
- Processes launching netsh
- Sc exe manipulating Windows services
- Suspicious reg exe process
- Unload Sysmon filter driver
- Windows common abused CMD shell risk behavior
- Next steps
In addition, these Splunk resources might help you understand and implement this use case:
- Blog: Threat Hunting with Splunk: Hands-on Tutorials for the Active Hunter
- If you are a Splunk Enterprise Security customer, you can also get help from the Security Research team's support options on GitHub.