- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects attempts to disable Windows Defender components using PowerShell’s Disable-WindowsOptionalFeature cmdlet.
This rule monitors Windows event logs for PowerShell script block execution that includes the Disable-WindowsOptionalFeature
cmdlet with specific parameters that target Windows Defender components. The detection looks for command executions that include the -Online
and -FeatureName
parameters along with specific Windows Defender component names such as Windows-Defender-Gui
, Windows-Defender-Features
, Windows-Defender
, or Windows-Defender-ApplicationGuard
. This activity is concerning because it represents an attempt to disable security controls that protect the system. Attackers often try to disable Windows Defender components to evade detection and reduce the risk of being caught.
{{host}}
.