Windows Audit Policy Restored via Auditpol.exe
Attackers may use auditpol.exe with the /restore argument to replace the existing audit policy with a malicious one, disabling auditing to evade detection, potentially leading to full machine compromise or lateral movement.
Attackers or red teams may use auditpol.exe with the /restore command-line argument to restore the audit policy from a file, potentially disabling crucial security logging. This technique is significant because it allows adversaries to bypass defenses and plan further attacks without being detected. The activity is typically observed using Endpoint Detection and Response (EDR) agents that monitor process executions and command-line arguments. The goal is often to limit the data available for detections and audits, creating a blind spot for defenders. Disabling or modifying audit policies can precede or accompany other malicious activities to hinder incident response and forensic investigations.
Attack Chain
- The attacker gains initial access to the system (e.g., through compromised credentials or exploiting a vulnerability).
- The attacker elevates privileges to a level where they can modify the audit policy.
- The attacker prepares a malicious audit policy file that disables or reduces auditing.
- The attacker executes
auditpol.exewith the/restoreparameter, specifying the path to the malicious audit policy file. auditpol.exereplaces the existing audit policy with the attacker-supplied policy.- Auditing is reduced or disabled, preventing the collection of security-relevant events.
- The attacker performs malicious activities, such as lateral movement, data exfiltration, or installing malware, without being properly logged.
- The attacker achieves their objective with a reduced risk of detection.
Impact
Successful execution of this technique can severely impair an organization’s ability to detect and respond to attacks. By disabling or reducing audit logging, attackers can operate with impunity, making it difficult to trace their actions and identify compromised systems. This can lead to a delayed response, allowing attackers to cause more damage, exfiltrate sensitive data, or establish a persistent foothold in the network. The impact ranges from data breaches and financial losses to reputational damage and legal liabilities.
Recommendation
- Deploy the Sigma rule
Auditpol.exe Restoring Audit Policyto your SIEM and tune for your environment to detect suspiciousauditpol.exeexecutions. - Monitor process creation events (Sysmon EventID 1, Windows Event Log Security 4688) for
auditpol.exeexecutions with the/restoreargument. - Implement strict access controls to prevent unauthorized modification of audit policies.
- Review audit policy configurations regularly to ensure they have not been tampered with.
- Whitelist legitimate uses of
auditpol.exe /restorewith known parent processes to reduce false positives, as described in the Known False Positives section. - Investigate any instances of
auditpol.exe /restoreas high-priority incidents, given the potential for defense evasion.
Detection coverage 2
Auditpol.exe Restoring Audit Policy
highDetects the execution of auditpol.exe with the /restore parameter, which can be used to disable or modify audit logging.
Suspicious Parent Process of Auditpol.exe Restore
mediumDetects auditpol.exe restoring audit policy from unusual parent processes.
Detection queries are kept inside the platform. Get full rules →