Defence Evasion (TA0005)

Sub-technique: T1070.001 - Clear Windows Event Logs

Objective: Detect attempts to clear event logs to evade detection.

  1. Detect Security Log Cleared Events

DeviceEvents
| where ActionType == "SecurityLogCleared"
| project Timestamp, DeviceName, InitiatingProcessCommandLine, InitiatingProcessAccountName, InitiatingProcessCreationTime, InitiatingProcessFileName, InitiatingProcessParentFileName

Purpose: Identify when security logs are cleared.

  1. Detect System Log Cleared Events

DeviceEvents
| where ActionType == "SystemLogCleared"
| project Timestamp, DeviceName, InitiatingProcessCommandLine, InitiatingProcessAccountName, InitiatingProcessCreationTime, InitiatingProcessFileName, InitiatingProcessParentFileName

Purpose: Monitor for system log clearing.

  1. Detect Application Log Cleared Events

DeviceEvents
| where ActionType == "ApplicationLogCleared"
| project Timestamp, DeviceName, InitiatingProcessCommandLine, InitiatingProcessAccountName, InitiatingProcessCreationTime, InitiatingProcessFileName, InitiatingProcessParentFileName

Purpose: Identify when application logs are cleared.

  1. Monitor for Log Deletion Commands

Purpose: Detect usage of log clearing commands.

  1. Identify Unauthorized Log Clearing Attempts

Purpose: Detect log clearing attempts by non-administrative users.

  1. Monitor for Event Log Service Restarts

Purpose: Identify restarts of the Event Log service.

  1. Detect Cleared Logs via PowerShell

Purpose: Monitor PowerShell commands used to clear event logs.

  1. Suspicious Access to Event Log Files

Purpose: Identify suspicious access to log files.

  1. Detect Log Clearing via Script

Purpose: Detect scripts used to clear event logs.

  1. Monitor Changes to Audit Policy

Purpose: Monitor changes to audit policies that could impact logging.

Last updated