Query Details

Security Log Cleared

Query

# Security Log Cleared

## Query Information

#### MITRE ATT&CK Technique(s)

| Technique ID | Title    | Link    |
| ---  | --- | --- |
| T1070.001 | Indicator Removal: Clear Windows Event Logs |https://attack.mitre.org/techniques/T1070/001/ |

#### Description
An attacker might delete the Security Log to hide the malicious activities. This rule only triggers on the deletion of the Security Events, however adversaries may also delete application, setup and system logs. The Windows Event log can become full, clearing the eventlog causes this rule to be triggered. 

#### Risk
An actor removes the security log to hide malicious activities. 

#### References
- https://content.fireeye.com/apt-41/rpt-apt41
- https://www.welivesecurity.com/2016/01/03/blackenergy-sshbeardoor-details-2015-attacks-ukrainian-news-media-electric-industry/

## Defender For Endpoint
```
DeviceEvents
| where ActionType == 'SecurityLogCleared'
| project Timestamp, DeviceName, ActionType
```
## Sentinel
```
DeviceEvents
| where ActionType == 'SecurityLogCleared'
| project Timestamp, DeviceName, ActionType
```

Explanation

This query is used to detect when the security log is cleared on a device. The security log is an important record of events on the device, and an attacker may delete it to hide their malicious activities. This query looks for events where the ActionType is 'SecurityLogCleared' and retrieves the Timestamp, DeviceName, and ActionType fields. The purpose of this query is to identify any suspicious activity related to the deletion of the security log.

Details

Bert-Jan Pals profile picture

Bert-Jan Pals

Released: February 14, 2023

Tables

DeviceEvents

Keywords

Devices,SecurityLogCleared

Operators

where==project

Actions