Windows Audit Policy Disabled via Legacy Auditpol
Adversaries may disable Windows audit policies using the legacy auditpol.exe utility to evade detection by limiting the data available for security monitoring and incident response.
The execution of the legacy auditpol.exe utility, included with the Windows 2000 Resource Kit Tools, is used to disable specific logging categories from the audit policy. This technique is often employed by adversaries and Red Teams to evade detection by reducing the amount of data available for security monitoring and incident response. This behavior, if confirmed malicious, can enable attackers to bypass defenses, potentially leading to full machine compromise or lateral movement. The use of auditpol.exe with the /disable argument, or category flags followed by the none option, indicates a deliberate attempt to tamper with system auditing configurations.
Attack Chain
- An attacker gains initial access to a compromised system through various means.
- The attacker executes
auditpol.exefrom the command line. - The attacker uses the
/disableparameter to disable auditing globally. - Alternatively, the attacker uses category-specific flags (e.g.,
/system,/logon,/object) with thenoneoption to disable auditing for those specific categories. - The command is executed with sufficient privileges to modify the audit policy.
- Windows processes the command and updates the system’s audit policy accordingly.
- Logging for the specified categories is disabled, reducing the visibility of attacker activity.
- The attacker proceeds with further malicious actions, knowing that their activities are less likely to be detected due to the reduced audit logging.
Impact
Successful execution of this attack can lead to significant gaps in security monitoring. With auditing disabled, security teams lose visibility into critical system events, making it more difficult to detect and respond to ongoing attacks. Attackers can exploit this lack of visibility to move laterally within the network, escalate privileges, and exfiltrate sensitive data without being detected.
Recommendation
- Enable Sysmon process creation logging (Event ID 1) and Windows Security Event Log (4688) to detect the execution of
auditpol.exewith suspicious command-line arguments. - Deploy the Sigma rule
Detect Auditpol Usageto your SIEM and tune for your environment. - Review and harden audit policies to prevent unauthorized modifications, as detailed in the Microsoft documentation.
- Monitor process execution for processes disabling audit logs.
Detection coverage 2
Detect Auditpol Usage
highDetects the execution of auditpol.exe with parameters that disable auditing.
Detect Auditpol via WMI
highDetects the execution of auditpol.exe via WMI
Detection queries are kept inside the platform. Get full rules →