Wiki source code of ASR-Regeln: Die Ereignis-ID’s 1121 und 1122 treten in Verbindung mit einer lsass.exe auf und blockieren den Vorgang
Last modified by Sabrina V. on 2024/10/23 06:23
Show last authors
author | version | line-number | content |
---|---|---|---|
1 | {{aagon.priorisierung}} | ||
2 | 10 | ||
3 | {{/aagon.priorisierung}} | ||
4 | |||
5 | When the agent service is restarted, the threats or alerts with Event IDs 1121 and 1122 may be triggered on the agent. | ||
6 | These events occur because the ASR rule „[['Block the theft of Windows Local Security Authority credentials'>>doc:ACMP.67.ACMP-Solutions.Security.Defender Management.Konfigurationsprofile.Konfigurationsprofil-Einstellungen.WebHome]]“ intervenes. This rule prevents direct access to LSASS memory by untrusted processes. So if a process tries to access LSASS using the OpenProcess() function with PROCESS_VM_READ permissions, the ASR rule will block that access. | ||
7 | |||
8 | {{figure}} | ||
9 | [[image:ereigniseigenschaften_1121_zoom80.png||data-xwiki-image-style-alignment="center"]] | ||
10 | |||
11 | {{figureCaption}} | ||
12 | Event properties - Event 1121 | ||
13 | {{/figureCaption}} | ||
14 | {{/figure}} | ||
15 | |||
16 | You can work around this blockage by adding lsass.exe as either an entire directory or file path in //Configuration Profiles// > //ASR Rule Exclusions//. Then select the //Exclude files and paths from ASR rules// checkbox. |