Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Detect Defender exclusions rules and ASR rules #59

Closed
nodauf opened this issue Jun 10, 2024 · 2 comments
Closed

Detect Defender exclusions rules and ASR rules #59

nodauf opened this issue Jun 10, 2024 · 2 comments
Labels
enhancement New feature or request

Comments

@nodauf
Copy link

nodauf commented Jun 10, 2024

From this tweet it is possible to enumerate Windows Defender's exclusions by listing the event ID 5007.
For example, whitelisting cmd.exe generates the following event
image
The tool https://github.com/0xsp-SRD/MDE_Enum already implement this finding and also enumerates the event ID 1121 to retrieve the ASR rules that have matched.

@itm4n itm4n added the enhancement New feature or request label Jun 10, 2024
@itm4n
Copy link
Owner

itm4n commented Jun 10, 2024

Good idea! Will see what I can do. 🙂

@itm4n
Copy link
Owner

itm4n commented Jun 10, 2024

Added with commit 2a163c3 (exclusions only, see issue #57 for ASR rules).

@itm4n itm4n closed this as completed Jun 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants