Capability ID | Capability Description | Category | Value | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|---|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | minimal | T1003 | OS Credential Dumping |
Comments
Most credential dumping operations do not require modifying resources that can be detected by this control (i.e. Registry and File system) and therefore its coverage is minimal.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | minimal | T1098 | Account Manipulation |
Comments
This control can detect account manipulation.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | minimal | T1137 | Office Application Startup |
Comments
This control can detect peristence via office application startup.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | minimal | T1546.010 | AppInit DLLs |
Comments
The detection score for this group of sub-techniques is assessed as Minimal due to the accuracy component of the score. The registry keys which are modified as a result of these sub-techniques can change frequently or are too numerous to monitor and therefore can result in significant amount of false positives.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | minimal | T1546.015 | Component Object Model Hijacking |
Comments
The detection score for this group of sub-techniques is assessed as Minimal due to the accuracy component of the score. The registry keys which are modified as a result of these sub-techniques can change frequently or are too numerous to monitor and therefore can result in significant amount of false positives.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | minimal | T1548 | Abuse Elevation Control Mechanism |
Comments
This control can detect abuse of elevation control mechanisms.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | minimal | T1548.002 | Bypass User Account Control |
Comments
Some UAC bypass methods rely on modifying specific, user-accessible Registry settings that can be monitored using this control. Overall, there are numerous other bypass methods that do not result in Registry modification that this control will not be effective in detection resulting in a low detection coverage factor.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | minimal | T1562 | Impair Defenses |
Comments
Due to low detection coverage, this technique is scored as minimal.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | minimal | T1562.001 | Disable or Modify Tools |
Comments
This control can be used to monitor Registry keys related to security software or event logging processes that can detect when an adversary attempts to disable these tools via modifying or deleting Registry keys. A majority of the cited procedure examples for this sub-technique are related to killing security processes rather than modifying the Registry, and therefore the detection coverage for this control is low.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | minimal | T1562.004 | Disable or Modify System Firewall |
Comments
There are numerous ways depending on the operating system that these sub-techniques can be accomplished. Monitoring the Windows Registry is one way depending on the procedure chosen to implement the sub-technique and therefore the overall coverage is low.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | minimal | T1562.006 | Indicator Blocking |
Comments
There are numerous ways depending on the operating system that these sub-techniques can be accomplished. Monitoring the Windows Registry is one way depending on the procedure chosen to implement the sub-technique and therefore the overall coverage is low.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | minimal | T1574 | Hijack Execution Flow |
Comments
This control can detect hijacked execution flow.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1003.001 | LSASS Memory |
Comments
This control can be used to detect the Windows Security Support Provider (SSP) DLLs variation of this sub-technique by monitoring the Registry keys used to register these DLLs. These keys should change infrequently and therefore false positives should be minimal.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1036.007 | Double File Extension |
Comments
This control can detect when files with two file extensions are created.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1036.008 | Masquerade File Type |
Comments
This control can detect if files are created or edited where the header and extension do not match.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1037 | Boot or Logon Initialization Scripts |
Comments
This control can detect abuse of boot or logon initialization scripts.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1037.001 | Logon Script (Windows) |
Comments
This control may detect changes to the Windows registry upon creation or modification of logon scripts. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1037.003 | Network Logon Script |
Comments
This control may detect changes to the Windows registry upon creation or modification of logon scripts. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1053.001 | At (Linux) |
Comments
This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1053.002 | At |
Comments
This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1053.003 | Cron |
Comments
This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1053.005 | Scheduled Task |
Comments
This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1053.006 | Systemd Timers |
Comments
This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1070.007 | Clear Network Connection History and Configurations |
Comments
This control can detect changes to files associated with this technique.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1070.008 | Clear Mailbox Data |
Comments
This control can detect changes to files associated with this technique.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1070.009 | Clear Persistence |
Comments
This control can detect changes to files associated with this technique.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1070.010 | Relocate Malware |
Comments
This control can detect changes to files associated with this technique.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1098.004 | SSH Authorized Keys |
Comments
This control may detect changes to the SSH authorized keys file which may indicate establishment of persistence. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1137.002 | Office Test |
Comments
This control may detect changes to the Windows registry to establish persistence with the Office Test sub-technique. The specificity of registry keys involved may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1222 | File and Directory Permissions Modification |
Comments
This control can detect file and directory permissions modification.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1222.001 | Windows File and Directory Permissions Modification |
Comments
This control can detect changes to the permissions of Windows and Linux files and can be used to detect modifications to sensitive directories and files that shouldn't change frequently. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1222.002 | Linux and Mac File and Directory Permissions Modification |
Comments
This control can detect changes to the permissions of Windows and Linux files and can be used to detect modifications to sensitive directories and files that shouldn't change frequently. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1505.004 | IIS Components |
Comments
This control can detect when files associated with the technique are created or modified, such as %windir%\system32\inetsrv\config\applicationhost.config.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1505.005 | Terminal Services DLL |
Comments
This control can detect when files or registry keys associated with this technique are created or modified, such as termsrv.dll and ServiceDll.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1543 | Create or Modify System Process |
Comments
This control can detect creation or modification of system-level processes.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1543.002 | Systemd Service |
Comments
This control may detect changes to the Windows registry upon creation or modification of Windows services. This control may also detect changes to files used by systemd to create/modify systemd services. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1543.003 | Windows Service |
Comments
This control may detect changes to the Windows registry upon creation or modification of Windows services. This control may also detect changes to files used by systemd to create/modify systemd services. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1546 | Event Triggered Execution |
Comments
The detection score for this technique was assessed as Partial because it doesn't detect some of the sub-techniques of this technique such as Windows Management Instrumentation (WMI) Event Subscription and Trap sub-techniques. Additionally for some sub-techniques, this control can be noisy.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1546.001 | Change Default File Association |
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1546.002 | Screensaver |
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1546.004 | Unix Shell Configuration Modification |
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1546.007 | Netsh Helper DLL |
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1546.008 | Accessibility Features |
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1546.009 | AppCert DLLs |
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1546.011 | Application Shimming |
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1546.012 | Image File Execution Options Injection |
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1546.013 | PowerShell Profile |
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1546.016 | Installer Packages |
Comments
This control can detect event triggered execution via installer packages.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1546.017 | Udev Rules |
Comments
This control can detect event triggered execution via udev rules.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1547 | Boot or Logon Autostart Execution |
Comments
This control can detect boot or logon autostart execution.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1547.001 | Registry Run Keys / Startup Folder |
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1547.002 | Authentication Package |
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1547.003 | Time Providers |
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1547.004 | Winlogon Helper DLL |
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1547.005 | Security Support Provider |
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1547.006 | Kernel Modules and Extensions |
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1547.008 | LSASS Driver |
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1547.009 | Shortcut Modification |
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1547.010 | Port Monitors |
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1547.012 | Print Processors |
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1547.014 | Active Setup |
Comments
This control can detect commands or registry key modifications associated with Active Setup such as HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1548.003 | Sudo and Sudo Caching |
Comments
This control may detect changes to the sudoers file which may indicate privilege escalation. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1553 | Subvert Trust Controls |
Comments
This control can be used to detect a subset of this technique's sub-techniques while minimizing the false positive rate.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1553.003 | SIP and Trust Provider Hijacking |
Comments
This control can detect modifications made to the Registry keys used to register Windows Subject Interface Packages (SIPs). Because this sub-technique can be accomplished without modifying the Registry via DLL Search Order Hijacking, it has been scored as Partial. The related Registry keys should not change often and therefore the false positive rate should be minimal. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1553.004 | Install Root Certificate |
Comments
This control can be used to detect when the system root certificates has changed by detecting the corresponding Registry or File system modifications that occur as a result. These root certificates should not change often and therefore the false positive rate is minimal. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1556 | Modify Authentication Process |
Comments
This control is effective for detecting the Registry and file system artifacts that are generated during the execution of some variations of this technique while minimizing false positives due to the locations being monitored changing infrequently (e.g. /etc/pam.d/).
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1556.002 | Password Filter DLL |
Comments
The Registry key used to register a Password Filter DLL can be monitored for changes using this control providing substantial coverage of this sub-technique. This key should not change often and therefore false positives should be minimal. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1556.003 | Pluggable Authentication Modules |
Comments
The PAM configuration and module paths (/etc/pam.d/) can be monitored for changes using this control. The files in this path should not change often and therefore false positives should be minimal. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1556.007 | Hybrid Identity |
Comments
This control can monitor for suspicious modification of files associated with hybrid identity authentication processes, such as configuration files.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1556.008 | Network Provider DLL |
Comments
This control can monitor for creation or changes to registry keys associated with network provider DLL such as HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1564.008 | Email Hiding Rules |
Comments
This control can detect when files are modified related to email rules such as RulesActiveState.plist, SyncedRules.plist, UnsyncedRules.plist, and MessageRules.plist on MacOS.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1564.009 | Resource Forking |
Comments
This control can detect when files are created or modified related to resource forking.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1564.012 | File/Path Exclusions |
Comments
This control can detect when files are created in folders associated with or spoofing that of trusted applications.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1574.006 | Dynamic Linker Hijacking |
Comments
This control may detect changes to the ld.so.preload file which may indicate an attempt to hijack execution flow. This sub-technique may also be utilized through an environment variable which this control may not detect. This control at worst scans for changes on an hourly basis.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1574.007 | Path Interception by PATH Environment Variable |
Comments
This control can detect file changes on VMs indicative of Path Interception by PATH Environment Variable.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1574.008 | Path Interception by Search Order Hijacking |
Comments
This control can detect file changes on VMs indicative of Path Interception by Search Order Hijacking.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1574.009 | Path Interception by Unquoted Path |
Comments
This control can detect file changes on VMs indicative of Path Interception by Unquoted Path.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | partial | T1574.014 | AppDomainManager |
Comments
This control can detect file changes on VMs indicative of hijacking of the AppDomainManager.
References
|
file_integrity_monitoring | Microsoft Defender for Cloud: File Integrity Monitoring | detect | significant | T1053 | Scheduled Task/Job |
Comments
This control can detect scheduled tasks/jobs.
References
|