Windows Security integration templates
Templates for building policies related to Windows Security.
F-Secure malware detected
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows, Agent version 5.1.2 or later
Detects when F-Secure identifies malware.
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0002 (Execution)
attack.mitre.org/tactics/TA0002/ |
T1204 (User Execution)
attack.mitre.org/techniques/T1204/ |
T1204.002 (Malicious File)
attack.mitre.org/techniques/T1204/002/ |
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Microsoft Office security weakened
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows, Agent version 4.2.0 or later
Detects when Microsoft Office security is compromised due to registry changes.
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/ |
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/ |
T1562.001 (Disable or Modify Tools)
attack.mitre.org/techniques/T1562/001/ |
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by policy | Enabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Windows Defender definitions deleted
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows, Agent version 4.1.0 or later
Detects when a user deletes a Windows Defender definition.
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/ |
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/ |
T1562.001 (Disable or Modify Tools)
attack.mitre.org/techniques/T1562/001/ |
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Windows Defender disabled
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows, Agent version 4.1.0 or later
Detects when a user disables Windows Defender.
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/ |
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/ |
T1562.001 (Disable or Modify Tools)
attack.mitre.org/techniques/T1562/001/ |
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by policy | Enabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Windows Defender malware detected
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows, Agent version 4.1.0 or later
Detects when Windows Defender identifies malware.
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0002 (Execution)
attack.mitre.org/tactics/TA0002/ |
T1204 (User Execution)
attack.mitre.org/techniques/T1204/ |
T1204.002 (Malicious File)
attack.mitre.org/techniques/T1204/002/ |
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by filename | Enabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Windows Defender settings modified
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows, Agent version 4.1.0 or later
Detects when a user modifies Windows Defender settings.
| Parameter | Type | Description |
|---|---|---|
| Registry key parameters | ||
| Registry keys | Advanced asset list | Settings modified involving these keys and their subkeys will be authorized or unauthorized. The * wildcard character is supported. For example, use "HKLM\SOFTWARE\Policies\Microsoft\Windows\Defender\Signature Updates\*" to authorize all changes to signature updates. Additionally, a key value can also be specified using the following syntax "key = value". For example, use "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet\SubmitSamplesConsent = 0x0" to authorize disabling automatic sample submission. |
| Update parameters | ||
| Ignore updates | Boolean | Toggle to enable/disable a time window either side of Windows Defender updates when setting changes will be authorized. |
| Ignore updates time window (in minutes) | Integer | The number of minutes either side of an update that setting changes will be authorized. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/ |
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/ |
T1562.001 (Disable or Modify Tools)
attack.mitre.org/techniques/T1562/001/ |
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Windows Firewall disabled
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows, Agent version 4.1.0 or later
Detects when a user disables Windows Firewall.
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/ |
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/ |
T1562.004 (Disable or Modify System Firewall)
attack.mitre.org/techniques/T1562/004/ |
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Windows Firewall rule modified
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows, Agent version 7.2.0 or later
Detects when a user modifies a Windows Firewall rule.
|
|
Subsequent detections and actions for the same Firewall rule name will not be generated until at least five minutes after the first detection/action. |
| Parameter | Type | Description |
|---|---|---|
| Process parameters | ||
| Binary names | Advanced asset list | A list of binary names (e.g. svchost.exe) that are authorized or unauthorized to edit firewall rules. Case-insensitive matching is used. |
| Binary paths | Advanced asset list | A list of binary paths authorized or unauthorized to edit firewall rules. The match can use glob-style pattern matching rules (e.g. C:\Program Files (x86)\Google\** would authorize all applications under the Google folder). Case-insensitive matching is used. |
| Firewall rule parameters | ||
| Firewall rule names | Advanced asset list | A list of firewall rule names users are authorized or unauthorized to edit. Full regular expression (regex) grammar is supported and case-insensitive matching is used. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/ |
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/ |
T1562.004 (Disable or Modify System Firewall)
attack.mitre.org/techniques/T1562/004/ |
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by binary name | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot