Skip to content
This repository has been archived by the owner on Nov 16, 2023. It is now read-only.

Create Changes to Antimalware Exclusions.md #255

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
36 changes: 36 additions & 0 deletions Defense evasion/Changes to Antimalware Exclusions.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
# Changes to Antimalware Exclusions
This query identifies creations, deletions, and modifications to registry keys involved with
Defender Antivirus exclusions.
## Query
```
DeviceRegistryEvents
| where RegistryKey contains @"\Microsoft\Windows Defender\Exclusions\"
| extend ExclusionType = trim_end('[e]?s',tolower(tostring(split(RegistryKey,'\\')[-1])))
| project Timestamp, DeviceId, DeviceName, ActionType, ExclusionType, Exclusion = RegistryValueName, InitiatingProcessAccountDomain, InitiatingProcessAccountName, RegistryKey, InitiatingProcessFolderPath, InitiatingProcessCommandLine, InitiatingProcessSHA256, InitiatingProcessSHA1, InitiatingProcessMD5
```
## Category
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
| Technique, tactic, or state | Covered? (v=yes) | Notes |
|------------------------|----------|-------|
| Initial access | | |
| Execution | | |
| Persistence | | |
| Privilege escalation | | |
| Defense evasion | v | |
| Credential Access | | |
| Discovery | | |
| Lateral movement | | |
| Collection | | |
| Command and control | | |
| Exfiltration | | |
| Impact | | |
| Vulnerability | | |
| Misconfiguration | | |
| Malware, component | | |

## Contributor info
**Contributor:** Michael Melone
**GitHub alias:** mjmelone
**Organization:** Microsoft
**Contact info:** @PowershellPoet