- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects when critical Windows event logs are cleared.
This rule monitors for event ID 104
from the Microsoft-Windows-Eventlog
provider, which indicates that an event log has been cleared. The query specifically focuses on security-relevant logs including Security
, System
, PowerShell/Operational
, PowerShellCore/Operational
, Sysmon/Operational
, and Windows PowerShell
.
Event logs record crucial system and security activities that are vital for incident response and forensic analysis. The @Event.EventData.Data.Channel
field identifies the specific log that was cleared. While log clearing can occasionally occur during routine maintenance, the clearing of certain logs is highly suspicious and rarely performed in normal operations.
Attackers frequently clear event logs to remove evidence of their intrusion, lateral movement, privilege escalation, or other malicious activities. This action significantly hampers security investigations and represents a serious attempt to avoid detection.
{{host}}
and the user account that performed the action.