Vendor: Microsoft Product: Microsoft Defender Rules Models MITRE ATT&CK® TTPs Activity Types Parsers 850 264 175 36 188 Use-Case Activity Types (Legacy Event Type)/Parsers MITRE ATT&CK® TTP Content Abnormal Authentication & Access user-create:success (account-creation) ↳microsoft-defenderep-json-user-create-success-useraccountcreated user-disable:success (account-disabled) ↳microsoft-defenderep-json-user-disable-success-accountdisabled user-enable:success (account-enabled) ↳microsoft-defenderep-json-user-enable-success-accountenabled user-password-modify:success (account-password-change) ↳microsoft-defenderep-json-user-password-modify-success-passwordchanged scheduled_task-trigger:success (app-activity) ↳microsoft-defenderep-json-app-activity-success-clrunbackedmoduleloaded ↳microsoft-defenderep-json-endpoint-notification-advancehuntingdevinfo ↳microsoft-defenderep-json-endpoint-notification-advancehuntingdevinfo ↳microsoft-defenderep-json-endpoint-notification-advancehuntingdevinfo ↳microsoft-defenderep-json-endpoint-notification-advancehuntingdevinfo ↳microsoft-defenderep-json-script-execute-success-scriptcontent ↳microsoft-defenderep-json-network-notification-success-networkinfo ↳microsoft-defenderep-json-network-notification-advancedhunting ↳microsoft-defenderep-cef-network-notification-advancedhunting ↳microsoft-defenderep-json-group-modify-success-groupmembershipchanged ↳microsoft-defenderep-xml-endpoint-activity-success-eventid ↳microsoft-defenderep-kv-endpoint-activity-deviceevents ↳microsoft-defenderep-json-endpoint-activity-registryevents ↳microsoft-defenderep-json-clipboard-read-getclipboarddata ↳microsoft-defenderep-sk4-clipboard-read-getclipboarddata ↳microsoft-defenderep-str-app-notification-upandrunning ↳microsoft-defenderep-str-app-notification-clienthealthreport ↳microsoft-defenderep-str-app-notification-stateupdated ↳microsoft-defenderep-str-app-notification-avsignatureupdated ↳microsoft-defenderep-str-app-notification-versionupdated ↳microsoft-defenderep-kv-app-notification-scanfinished ↳microsoft-defenderep-str-app-notification-versionupdated-1 ↳microsoft-defenderep-str-app-notification-encounterederror ↳microsoft-defenderep-xml-app-notification-success-1150 ↳microsoft-defenderep-str-app-notification-removedhistory ↳microsoft-defenderep-cef-endpoint-notification-advancehuntingdevinfo ↳microsoft-defenderep-sk4-endpoint-notification-huntingdeviceevents ↳microsoft-defenderep-json-endpoint-notification-pnpdeviceconnected ↳microsoft-defenderep-json-endpoint-notification-deviceinfo ↳microsoft-defenderep-kv-endpoint-notification-eventhubbeat ↳microsoft-defenderep-cef-endpoint-notification-deviceconnected ↳microsoft-defenderep-json-endpoint-notification-success-devicefilecertificateinfo ↳microsoft-defenderep-json-app-notification-success-emailpostdeliveryevent ↳microsoft-defenderep-json-endpoint-activity-success-identityqueryevents ↳microsoft-defenderep-json-endpoint-activity-success-deviceevents ↳microsoft-defenderep-sk4-endpoint-activity-deviceevents ↳microsoft-365defender-json-endpoint-activity-success-publish-identityinfo ↳microsoft-defenderep-sk4-alert-trigger-acgenforced ↳microsoft-defenderep-sk4-alert-trigger-theftblocked ↳microsoft-defenderep-json-alert-trigger-success-childprocessaudited ↳microsoft-defenderep-sk4-alert-trigger-antivirusreport ↳microsoft-defenderep-json-alert-trigger-antivirusreport ↳microsoft-defenderep-sk4-alert-trigger-theftaudited ↳microsoft-defenderep-sk4-alert-trigger-childprocessaudited ↳microsoft-defenderep-json-endpoint-activity-success-directoryservicesreplication ↳microsoft-defenderep-json-endpoint-activity-success-directoryservicesreplication endpoint-login:fail (authentication-failed) ↳microsoft-defenderep-json-endpoint-login-identitylogonevents ↳microsoft-windows-cef-endpoint-login-device endpoint-login:success (authentication-successful) ↳microsoft-defenderep-json-endpoint-login-identitylogonevents ↳microsoft-windows-cef-endpoint-login-device endpoint-login:fail (failed-logon) ↳microsoft-defenderep-cef-endpoint-login-service ↳microsoft-defenderep-cef-endpoint-login-remoteinteractive ↳microsoft-defenderep-cef-endpoint-login-network ↳microsoft-defenderep-cef-endpoint-login-interactive ↳microsoft-defenderep-cef-endpoint-login-batch endpoint-login:success (local-logon) ↳microsoft-defenderep-cef-endpoint-login-interactive group-member-add:success (member-added) ↳microsoft-defenderep-json-group-member-add-success-useraccountadded ↳microsoft-azure-kv-group-member-add-success-eventhubbeat group-member-remove:success (member-removed) ↳microsoft-defenderep-json-group-member-remove-success-useraccountremoved ↳microsoft-azure-kv-group-member-remove-success-deviceevents endpoint-login:success (remote-access) ↳microsoft-defenderep-cef-endpoint-login-network endpoint-login:success (remote-logon) ↳microsoft-defenderep-json-rdp-traffic-success ↳microsoft-azure-csv-rdp-traffic-success-vmid ↳microsoft-defenderep-cef-endpoint-login-remoteinteractive http-traffic:success (web-activity-allowed) ↳microsoft-defenderep-json-http-session-success-urlclickevents http-session:fail (web-activity-denied) ↳microsoft-defenderep-json-http-session-success-urlclickevents T1021 - Remote ServicesT1071 - Application Layer ProtocolT1071.001 - Application Layer Protocol: Web ProtocolsT1078 - Valid AccountsT1078.002 - T1078.002T1078.003 - Valid Accounts: Local AccountsT1110 - Brute ForceT1133 - External Remote Services 55 Rules26 Models Account Manipulation user-create:success (account-creation) ↳microsoft-defenderep-json-user-create-success-useraccountcreated user-password-modify:success (account-password-change) ↳microsoft-defenderep-json-user-password-modify-success-passwordchanged scheduled_task-trigger:success (app-activity) ↳microsoft-defenderep-json-app-activity-success-clrunbackedmoduleloaded ↳microsoft-defenderep-json-endpoint-notification-advancehuntingdevinfo ↳microsoft-defenderep-json-endpoint-notification-advancehuntingdevinfo ↳microsoft-defenderep-json-endpoint-notification-advancehuntingdevinfo ↳microsoft-defenderep-json-endpoint-notification-advancehuntingdevinfo ↳microsoft-defenderep-json-script-execute-success-scriptcontent ↳microsoft-defenderep-json-network-notification-success-networkinfo ↳microsoft-defenderep-json-network-notification-advancedhunting ↳microsoft-defenderep-cef-network-notification-advancedhunting ↳microsoft-defenderep-json-group-modify-success-groupmembershipchanged ↳microsoft-defenderep-xml-endpoint-activity-success-eventid ↳microsoft-defenderep-kv-endpoint-activity-deviceevents ↳microsoft-defenderep-json-endpoint-activity-registryevents ↳microsoft-defenderep-json-clipboard-read-getclipboarddata ↳microsoft-defenderep-sk4-clipboard-read-getclipboarddata ↳microsoft-defenderep-str-app-notification-upandrunning ↳microsoft-defenderep-str-app-notification-clienthealthreport ↳microsoft-defenderep-str-app-notification-stateupdated ↳microsoft-defenderep-str-app-notification-avsignatureupdated ↳microsoft-defenderep-str-app-notification-versionupdated ↳microsoft-defenderep-kv-app-notification-scanfinished ↳microsoft-defenderep-str-app-notification-versionupdated-1 ↳microsoft-defenderep-str-app-notification-encounterederror ↳microsoft-defenderep-xml-app-notification-success-1150 ↳microsoft-defenderep-str-app-notification-removedhistory ↳microsoft-defenderep-cef-endpoint-notification-advancehuntingdevinfo ↳microsoft-defenderep-sk4-endpoint-notification-huntingdeviceevents ↳microsoft-defenderep-json-endpoint-notification-pnpdeviceconnected ↳microsoft-defenderep-json-endpoint-notification-deviceinfo ↳microsoft-defenderep-kv-endpoint-notification-eventhubbeat ↳microsoft-defenderep-cef-endpoint-notification-deviceconnected ↳microsoft-defenderep-json-endpoint-notification-success-devicefilecertificateinfo ↳microsoft-defenderep-json-app-notification-success-emailpostdeliveryevent ↳microsoft-defenderep-json-endpoint-activity-success-identityqueryevents ↳microsoft-defenderep-json-endpoint-activity-success-deviceevents ↳microsoft-defenderep-sk4-endpoint-activity-deviceevents ↳microsoft-365defender-json-endpoint-activity-success-publish-identityinfo ↳microsoft-defenderep-sk4-alert-trigger-acgenforced ↳microsoft-defenderep-sk4-alert-trigger-theftblocked ↳microsoft-defenderep-json-alert-trigger-success-childprocessaudited ↳microsoft-defenderep-sk4-alert-trigger-antivirusreport ↳microsoft-defenderep-json-alert-trigger-antivirusreport ↳microsoft-defenderep-sk4-alert-trigger-theftaudited ↳microsoft-defenderep-sk4-alert-trigger-childprocessaudited ↳microsoft-defenderep-json-endpoint-activity-success-directoryservicesreplication ↳microsoft-defenderep-json-endpoint-activity-success-directoryservicesreplication group-member-add:success (member-added) ↳microsoft-defenderep-json-group-member-add-success-useraccountadded ↳microsoft-azure-kv-group-member-add-success-eventhubbeat group-member-remove:success (member-removed) ↳microsoft-defenderep-json-group-member-remove-success-useraccountremoved ↳microsoft-azure-kv-group-member-remove-success-deviceevents process-create:success (process-created) ↳microsoft-defenderep-json-process-create-success-events ↳microsoft-defenderep-cef-process-create-success-processcreated ↳microsoft-defenderep-sk4-process-create-success-processcreated ↳microsoft-windows-cef-process-create-success-process ↳microsoft-defenderep-json-process-memory-allocate-success-ntallocatevirtualmemory ↳microsoft-defenderep-cef-process-memory-allocate-advancedhunting-1 ↳microsoft-defenderep-cef-script-execute-powershellcommand ↳microsoft-defenderep-json-script-execute-success-powershellcommand ↳microsoft-defenderep-json-process-create-success-processcreatedusingwmiquery ↳microsoft-azure-kv-process-create-success-processcreated ↳microsoft-azure-kv-process-create-success-powershellcommand ↳microsoft-defenderep-sk4-process-create-success-deviceprocessevents T1003 - OS Credential DumpingT1003.003 - T1003.003T1021 - Remote ServicesT1021.003 - T1021.003T1059 - Command and Scripting InterperterT1059.001 - Command and Scripting Interperter: PowerShellT1059.003 - T1059.003T1078 - Valid AccountsT1098 - Account ManipulationT1098.002 - Account Manipulation: Exchange Email Delegate PermissionsT1136 - Create AccountT1136.001 - Create Account: Create: Local AccountT1136.002 - T1136.002T1218 - Signed Binary Proxy ExecutionT1218.010 - Signed Binary Proxy Execution: Regsvr32T1531 - Account Access RemovalT1559 - Inter-Process CommunicationT1559.002 - T1559.002 59 Rules25 Models Next Page -->> MITRE ATT&CK® Framework for Enterprise Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact Phishing: Spearphishing LinkExternal Remote ServicesValid AccountsDrive-by CompromiseExploit Public Fasing ApplicationReplication Through Removable MediaPhishing Windows Management InstrumentationCommand and Scripting InterperterScheduled Task/JobInter-Process CommunicationSystem ServicesExploitation for Client ExecutionUser ExecutionScheduled Task/Job: Scheduled TaskCommand and Scripting Interperter: PowerShellSoftware Deployment ToolsScheduled Task/Job: At (Windows) Pre-OS BootCreate AccountCreate or Modify System ProcessExternal Remote ServicesValid AccountsHijack Execution FlowServer Software Component: Web ShellAccount ManipulationBITS JobsCreate or Modify System Process: Windows ServiceScheduled Task/JobServer Software ComponentEvent Triggered ExecutionBoot or Logon Autostart ExecutionCreate Account: Create: Local AccountAccount Manipulation: Exchange Email Delegate Permissions Access Token Manipulation: Token Impersonation/TheftCreate or Modify System ProcessValid AccountsAccess Token ManipulationExploitation for Privilege EscalationHijack Execution FlowGroup Policy ModificationProcess InjectionScheduled Task/JobAbuse Elevation Control MechanismEvent Triggered ExecutionBoot or Logon Autostart ExecutionProcess Injection: Dynamic-link Library InjectionAbuse Elevation Control Mechanism: Bypass User Account Control Hide ArtifactsIndirect Command ExecutionImpair DefensesIndicator Removal on Host: Clear Windows Event LogsGroup Policy ModificationTrusted Developer Utilities Proxy ExecutionMasquerading: Match Legitimate Name or LocationMasquerading: Rename System UtilitiesFile and Directory Permissions Modification: Windows File and Directory Permissions ModificationObfuscated Files or Information: Compile After DeliveryObfuscated Files or Information: Indicator Removal from ToolsHijack Execution Flow: DLL Side-LoadingMasqueradingValid AccountsModify RegistryBITS JobsUse Alternate Authentication MaterialHide Artifacts: NTFS File AttributesUse Alternate Authentication Material: Pass the HashIndicator Removal on HostUse Alternate Authentication Material: Pass the TicketPre-OS BootFile and Directory Permissions ModificationDeobfuscate/Decode Files or InformationAbuse Elevation Control MechanismImpair Defenses: Disable or Modify System FirewallObfuscated Files or InformationSigned Binary Proxy Execution: Compiled HTML FileAccess Token ManipulationHijack Execution FlowProcess InjectionValid Accounts: Local AccountsSigned Binary Proxy Execution: MsiexecSigned Binary Proxy ExecutionSigned Binary Proxy Execution: Regsvcs/RegasmSigned Binary Proxy Execution: CMSTPSigned Binary Proxy Execution: Control PanelSigned Binary Proxy Execution: InstallUtilSigned Binary Proxy Execution: Regsvr32Trusted Developer Utilities Proxy Execution: MSBuildSigned Binary Proxy Execution: Rundll32 OS Credential DumpingUnsecured CredentialsBrute ForceSteal or Forge Kerberos TicketsCredentials from Password StoresSteal or Forge Kerberos Tickets: KerberoastingNetwork Sniffing Account DiscoveryDomain Trust DiscoverySystem Service DiscoverySystem Network Connections DiscoveryAccount Discovery: Local AccountAccount Discovery: Domain AccountFile and Directory DiscoveryNetwork SniffingSystem Information DiscoveryNetwork Share DiscoveryQuery RegistryProcess DiscoverySystem Owner/User DiscoverySoftware DiscoveryRemote System DiscoverySystem Network Configuration Discovery Exploitation of Remote ServicesRemote Service Session HijackingRemote ServicesRemote Services: SMB/Windows Admin SharesUse Alternate Authentication MaterialRemote Services: Remote Desktop ProtocolSoftware Deployment ToolsReplication Through Removable MediaInternal Spearphishing Screen CaptureData from Information RepositoriesEmail CollectionAudio CaptureArchive Collected DataEmail Collection: Email Forwarding Rule Web ServiceProtocol TunnelingApplication Layer Protocol: DNSApplication Layer Protocol: File Transfer ProtocolsApplication Layer Protocol: Web ProtocolsRemote Access SoftwareDynamic ResolutionIngress Tool TransferDynamic Resolution: Domain Generation AlgorithmsProxy: Multi-hop ProxyApplication Layer ProtocolProxy Exfiltration Over Alternative ProtocolExfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolExfiltration Over Physical Medium: Exfiltration over USBExfiltration Over C2 ChannelExfiltration Over Physical MediumAutomated ExfiltrationExfiltration Over Web Service: Exfiltration to Cloud StorageExfiltration Over Web Service Account Access RemovalResource HijackingData Encrypted for ImpactInhibit System Recovery