- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects execution of the NoFilter tool used for access token manipulation and privilege escalation.
This rule monitors Windows filtering platform events, where @evt.id
is 5447
for filter deletion or @evt.id
is 5449
for provider context deletion when the filter name or provider context name contains RonPolicy
. NoFilter is a security research tool that manipulates Windows Filtering Platform (WFP) to disable security filters and bypass access controls. The tool creates distinctive WFP artifacts with RonPolicy
naming conventions that can be reliably detected. Attackers use NoFilter to disable endpoint protection, bypass application controls, and manipulate access tokens for defense evasion and privilege escalation.
RonPolicy
identifier on {{host}}
to determine the source of the NoFilter execution.