Query Details
//Hunt for Defender tampering attempts DeviceRegistryEvents | where Timestamp >= ago(7d) | where RegistryKey == "HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows Defender" | where RegistryValueName == "DisableAntiSpyware" | where RegistryValueType == "Dword" | where RegistryValueData == 1 | where IsInitiatingProcessRemoteSession == true
This query is designed to detect attempts to tamper with Microsoft Defender settings. Here's a simple breakdown:
In summary, this query hunts for instances where someone has remotely disabled anti-spyware protection in Microsoft Defender within the past week.

Rod Trent
Released: August 5, 2024
Tables
Keywords
Operators