Query Details
Tags: Query: DeviceRegistryEvents | where RegistryKey contains @"windows defender\exclusions" and InitiatingProcessCommandLine != @"svchost.exe -k GPSvcGroup" and InitiatingProcessCommandLine != @"svchost.exe -k netsvcs -p -s gpsvc" and InitiatingProcessCommandLine != @"msiexec.exe /V" and InitiatingProcessAccountName != @"system" | where InitiatingProcessParentId != 0 References
This KQL (Kusto Query Language) query is designed to search through DeviceRegistryEvents for specific registry key changes related to Windows Defender exclusions. Here's a simplified breakdown of what the query does:
svchost.exe -k GPSvcGroupsvchost.exe -k netsvcs -p -s gpsvcmsiexec.exe /VIn summary, this query identifies changes to Windows Defender exclusions in the registry that are not made by specific known processes or the system account, and ensures that the changes are initiated by non-root processes.

Ali Hussein
Released: September 13, 2023
Tables
Keywords
Operators