endpoint(opens in a new tab or window)
windows(opens in a new tab or window)
system(opens in a new tab or window)
m365_defender(opens in a new tab or window)
process where host.os.type == "windows" and event.type == "start" and
(process.name: "bcdedit.exe" or ?process.pe.original_file_name == "bcdedit.exe") and process.args: ("-set", "/set") and
process.args: ("TESTSIGNING", "nointegritychecks", "loadoptions", "DISABLE_INTEGRITY_CHECKS")
Install detection rules in Elastic Security
Detect Code Signing Policy Modification Through Built-in tools in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).