-
-
Notifications
You must be signed in to change notification settings - Fork 2.5k
Add and Enhance Windows GPO & RDP Tampering Detection Rules #5717
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add and Enhance Windows GPO & RDP Tampering Detection Rules #5717
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR introduces detection rules for ransomware-related activities associated with The Gentlemen ransomware group and similar threat actors. The rules focus on detecting RDP security weakening through registry modifications and unauthorized Group Policy Object (GPO) changes.
Key changes include:
- Detection of RDP SecurityLayer registry tampering through both registry monitoring and process creation events
- Detection of suspicious modifications to default domain GPOs via Group Policy Management Editor
- Detection of default domain GPO modifications through Windows Security event logs
Reviewed Changes
Copilot reviewed 5 out of 5 changed files in this pull request and generated 4 comments.
Show a summary per file
| File | Description |
|---|---|
| registry_set_rdp_securitylayer.yml | Detects registry changes to RDP SecurityLayer values that weaken authentication |
| proc_creation_win_reg_rdp_securitylayer.yml | Detects command-line registry modifications to RDP SecurityLayer settings |
| proc_creation_win_default_domain_gpo_modification_via_gpme.yml | Detects use of GPME to modify default domain GPOs |
| win_security_default_domain_gpo_modification.yml | Detects Event ID 5136 modifications to default domain GPOs |
| known-FPs.csv | Adds false positive exception for GPO modification rule |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
rules/windows/registry/registry_set/registry_set_rdp_securitylayer.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_reg_rdp_securitylayer.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_default_domain_gpo_modification_via_gpme.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_reg_rdp_securitylayer.yml
Outdated
Show resolved
Hide resolved
.../windows/process_creation/proc_creation_win_mmc_default_domain_gpo_modification_via_gpme.yml
Show resolved
Hide resolved
|
Will review |
2f09484 to
47fa18f
Compare
|
@tropChaud: Can you provide example events for each rule? |
Checked the rules except for the SACL one that swach suggested. Which I assume he did test it. So we should be good to go. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull request overview
Copilot reviewed 5 out of 5 changed files in this pull request and generated 3 comments.
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
rules/windows/process_creation/proc_creation_win_reg_rdp_keys_tamper.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_reg_rdp_keys_tamper.yml
Show resolved
Hide resolved
rules/windows/registry/registry_set/registry_set_terminal_server_tampering.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_reg_rdp_keys_tamper.yml
Outdated
Show resolved
Hide resolved
Co-authored-by: Copilot <[email protected]>
Co-authored-by: Copilot <[email protected]>
…tamper.yml Co-authored-by: Swachchhanda Shrawan Poudel <[email protected]>
46e0f74 to
6ce2e15
Compare
Summary of the Pull Request
New rules related to recent reported ransom group activity (The Gentlemen, and some similar to previously reported activity)
Changelog
new: Windows Default Domain GPO Modification
new: Windows Default Domain GPO Modification via GPME
update: Potential Tampering With RDP Related Registry Keys Via Reg.EXE - Add coverage for
SecurityLayervalueupdate: RDP Sensitive Settings Changed - Add coverage for
SecurityLayervalueExample Log Event
Fixed Issues
SigmaHQ Rule Creation Conventions