Disable Windows Event Logging (T1562.002)

View on ATT&CK

In Playbook

Associated Tactics

  • Defense Evasion

Defense Evasion (TA0005)

The adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.

View on ATT&CK

Procedure Examples

Description Source(s)
dmcxblue. (n.d.). Disable Windows Event Logging. Retrieved September 10, 2021. Disable_Win_Event_Logging
Chandel, R. (2021, April 22). Defense Evasion: Windows Event Logging (T1562.002). Retrieved September 14, 2021. def_ev_win_event_logging
Core Technologies. (2021, May 24). Essential Windows Services: EventLog / Windows Event Log. Retrieved September 14, 2021. EventLog_Core_Technologies
Daniel Simpson. (2017, April 19). Audit Policy. Retrieved September 13, 2021. Audit_Policy_Microsoft
Franklin Smith. (n.d.). Windows Security Log Events. Retrieved February 21, 2020. Windows Log Events
Heiligenstein, L. (n.d.). REP-25: Disable Windows Event Logging. Retrieved April 7, 2022. disable_win_evt_logging
Jason Gerend, et al. (2017, October 16). auditpol. Retrieved September 1, 2021. auditpol
Naceri, A. (2021, November 7). Windows Server 2019 file overwrite bug. Retrieved April 7, 2022. winser19_file_overwrite_bug_twitter
redcanaryco. (2021, September 3). T1562.002 - Disable Windows Event Logging. Retrieved September 13, 2021. T1562.002_redcanaryco
Simpson, D. et al. (2017, April 19). Advanced security audit policy settings. Retrieved September 14, 2021. Advanced_sec_audit_policy_settings
STRONTIC. (n.d.). auditpol.exe. Retrieved September 9, 2021. auditpol.exe_STRONTIC
svch0st. (2020, September 30). Event Log Tampering Part 1: Disrupting the EventLog Service. Retrieved September 14, 2021. evt_log_tampering