Defence Evasion (TA0005)
Sub-technique: T1070.001 - Clear Windows Event Logs
Objective: Detect attempts to clear event logs to evade detection.
Detect Security Log Cleared Events
DeviceEvents
| where ActionType == "SecurityLogCleared"
| project Timestamp, DeviceName, InitiatingProcessCommandLine, InitiatingProcessAccountName, InitiatingProcessCreationTime, InitiatingProcessFileName, InitiatingProcessParentFileNamePurpose: Identify when security logs are cleared.
Detect System Log Cleared Events
DeviceEvents
| where ActionType == "SystemLogCleared"
| project Timestamp, DeviceName, InitiatingProcessCommandLine, InitiatingProcessAccountName, InitiatingProcessCreationTime, InitiatingProcessFileName, InitiatingProcessParentFileNamePurpose: Monitor for system log clearing.
Detect Application Log Cleared Events
DeviceEvents
| where ActionType == "ApplicationLogCleared"
| project Timestamp, DeviceName, InitiatingProcessCommandLine, InitiatingProcessAccountName, InitiatingProcessCreationTime, InitiatingProcessFileName, InitiatingProcessParentFileNamePurpose: Identify when application logs are cleared.
Monitor for Log Deletion Commands
Purpose: Detect usage of log clearing commands.
Identify Unauthorized Log Clearing Attempts
Purpose: Detect log clearing attempts by non-administrative users.
Monitor for Event Log Service Restarts
Purpose: Identify restarts of the Event Log service.
Detect Cleared Logs via PowerShell
Purpose: Monitor PowerShell commands used to clear event logs.
Suspicious Access to Event Log Files
Purpose: Identify suspicious access to log files.
Detect Log Clearing via Script
Purpose: Detect scripts used to clear event logs.
Monitor Changes to Audit Policy
Purpose: Monitor changes to audit policies that could impact logging.
Last updated