endpoint(opens in a new tab or window)
windows(opens in a new tab or window)
system(opens in a new tab or window)
m365_defender(opens in a new tab or window)
process where host.os.type == "windows" and event.type == "start" and
(
(
(process.name:"logman.exe" or ?process.pe.original_file_name == "Logman.exe") and
process.args : "EventLog-*" and process.args : ("stop", "delete")
) or
(
(
process.name : ("pwsh.exe", "powershell.exe", "powershell_ise.exe") or
?process.pe.original_file_name in ("pwsh.exe", "powershell.exe", "powershell_ise.exe")
) and
process.args : "Set-Service" and process.args: "EventLog" and process.args : "Disabled"
) or
(
(process.name:"auditpol.exe" or ?process.pe.original_file_name == "AUDITPOL.EXE") and process.args : "/success:disable"
)
)
Install detection rules in Elastic Security
Detect Disable Windows Event and Security Logs Using Built-in Tools in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).