Rare Windows Firewall Rule updates using Netsh

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query searches for rare firewall rule changes using netsh utility by comparing rule names and program names from the previous day.

Attribute Value
Type Hunting Query
Solution Endpoint Threat Protection Essentials
ID e3e8c913-e5e9-4517-b4f7-dd1ec071888f
Severity Low
Tactics Execution
Techniques T1204
Required Connectors SecurityEvents, MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
DeviceProcessEvents ?
Event Source == "Microsoft-Windows-Sysmon" ?
SecurityEvent EventID == "1" ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Endpoint Threat Protection Essentials