Techniques
Sample rules
Windows Firewall Disabled via PowerShell
- source: elastic
- technicques:
- T1059
- T1562
Description
Identifies when the Windows Firewall is disabled using PowerShell cmdlets, which can help attackers evade network constraints, like internet and network lateral communication restrictions.
Detection logic
process where host.os.type == "windows" and event.type == "start" and
(
process.name : ("powershell.exe", "pwsh.exe", "powershell_ise.exe") or
?process.pe.original_file_name in ("powershell.exe", "pwsh.dll", "powershell_ise.exe")
) and
process.args : "*Set-NetFirewallProfile*" and
process.args : "*-Enabled*" and process.args : "*False*" and
process.args : ("*-All*", "*Public*", "*Domain*", "*Private*")