Windows important scheduled task deleted or disabled

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects when critical Windows system scheduled tasks are deleted or disabled.

Strategy

This detection monitors event logs for deletion (Event ID 4699) or disabling (Event ID 4701) of critical scheduled tasks related to system security and maintenance. For deletion events, it specifically filters out service account activity by excluding events where SubjectUserName ends with “$”. The detection looks for tasks matching specific patterns such as paths containing Windows Defender, BitLocker, System Restore, Windows Update, and other security-related scheduled tasks.

These critical scheduled tasks are essential components of Windows security infrastructure, providing functions like automated backups, malware scanning, and system updates. Tampering with these tasks could indicate defense evasion tactics being employed by threat actors attempting to weaken security controls.

Triage & Response

  • Identify the {{host}} where the critical scheduled task was deleted or disabled.
  • Determine which user account performed the action by reviewing the event details.
  • Verify if the action was part of legitimate system maintenance or authorized activity.
  • Check which specific task was affected to understand the potential security impact.
  • Look for other suspicious activities on the same host, such as the creation of new scheduled tasks.
  • Investigate how the user gained sufficient privileges to modify these critical tasks.
  • Restore the deleted or disabled scheduled task to ensure proper system security.
  • Review authentication logs to determine if the user account may have been compromised.