Skip to content
Threat Feed
high advisory

Windows Audit Policy Restored via Auditpol.exe

Attackers may use auditpol.exe with the /restore argument to replace the existing audit policy with a malicious one, disabling auditing to evade detection, potentially leading to full machine compromise or lateral movement.

Attackers or red teams may use auditpol.exe with the /restore command-line argument to restore the audit policy from a file, potentially disabling crucial security logging. This technique is significant because it allows adversaries to bypass defenses and plan further attacks without being detected. The activity is typically observed using Endpoint Detection and Response (EDR) agents that monitor process executions and command-line arguments. The goal is often to limit the data available for detections and audits, creating a blind spot for defenders. Disabling or modifying audit policies can precede or accompany other malicious activities to hinder incident response and forensic investigations.

Attack Chain

  1. The attacker gains initial access to the system (e.g., through compromised credentials or exploiting a vulnerability).
  2. The attacker elevates privileges to a level where they can modify the audit policy.
  3. The attacker prepares a malicious audit policy file that disables or reduces auditing.
  4. The attacker executes auditpol.exe with the /restore parameter, specifying the path to the malicious audit policy file.
  5. auditpol.exe replaces the existing audit policy with the attacker-supplied policy.
  6. Auditing is reduced or disabled, preventing the collection of security-relevant events.
  7. The attacker performs malicious activities, such as lateral movement, data exfiltration, or installing malware, without being properly logged.
  8. The attacker achieves their objective with a reduced risk of detection.

Impact

Successful execution of this technique can severely impair an organization’s ability to detect and respond to attacks. By disabling or reducing audit logging, attackers can operate with impunity, making it difficult to trace their actions and identify compromised systems. This can lead to a delayed response, allowing attackers to cause more damage, exfiltrate sensitive data, or establish a persistent foothold in the network. The impact ranges from data breaches and financial losses to reputational damage and legal liabilities.

Recommendation

  • Deploy the Sigma rule Auditpol.exe Restoring Audit Policy to your SIEM and tune for your environment to detect suspicious auditpol.exe executions.
  • Monitor process creation events (Sysmon EventID 1, Windows Event Log Security 4688) for auditpol.exe executions with the /restore argument.
  • Implement strict access controls to prevent unauthorized modification of audit policies.
  • Review audit policy configurations regularly to ensure they have not been tampered with.
  • Whitelist legitimate uses of auditpol.exe /restore with known parent processes to reduce false positives, as described in the Known False Positives section.
  • Investigate any instances of auditpol.exe /restore as high-priority incidents, given the potential for defense evasion.

Detection coverage 2

Auditpol.exe Restoring Audit Policy

high

Detects the execution of auditpol.exe with the /restore parameter, which can be used to disable or modify audit logging.

sigma tactics: defense_evasion techniques: T1562.002 sources: process_creation, windows

Suspicious Parent Process of Auditpol.exe Restore

medium

Detects auditpol.exe restoring audit policy from unusual parent processes.

sigma tactics: defense_evasion techniques: T1562.002 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →