T1562.006

Indicator Blocking

Adversaries may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. This includes tampering with Event Tracing for Windows (ETW), disabling crash dumps, modifying syslog configuration, redirecting telemetry, or blocking network traffic to SIEM/logging infrastructure. ETW tampering is particularly impactful as many security tools depend on ETW providers for visibility.

Microsoft Sentinel / Defender
kusto
let ETWTampering = dynamic(["Set-EtwTraceProvider", "logman stop", "logman delete", "logman update", "Remove-EtwTraceProvider", "EtwEventWrite", "NtTraceEvent", "NtTraceControl"]);
let CrashDumpTampering = dynamic(["CrashDumpEnabled", "NMICrashDump"]);
let SyslogTampering = dynamic(["systemctl stop rsyslog", "systemctl stop syslog-ng", "service rsyslog stop", "service syslog stop", "esxcli system syslog"]);
let IndicatorBlocking = dynamic(["Set-EtwTraceProvider", "logman stop", "logman delete", "CrashDumpEnabled", "systemctl stop rsyslog", "systemctl stop syslog-ng", "service rsyslog stop"]);
union DeviceProcessEvents, DeviceRegistryEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (IndicatorBlocking)
   or ProcessCommandLine has_any (ETWTampering)
   or ProcessCommandLine has_any (SyslogTampering)
   or (ActionType == "RegistryValueSet" and RegistryKey has "CrashControl" and RegistryValueName has_any (CrashDumpTampering))
| extend BlockingType = case(
    ProcessCommandLine has_any ("Set-EtwTraceProvider", "logman stop", "logman delete", "logman update", "Remove-EtwTraceProvider"), "ETW Tampering",
    ProcessCommandLine has_any ("EtwEventWrite", "NtTraceEvent", "NtTraceControl"), "ETW API Patching",
    RegistryValueName has "CrashDumpEnabled" or ProcessCommandLine has "CrashDumpEnabled", "Crash Dump Disabled",
    ProcessCommandLine has_any ("rsyslog", "syslog-ng", "syslog"), "Syslog Tampering",
    "Other")
| project Timestamp, DeviceName, AccountName, BlockingType, ProcessCommandLine, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessFileName
| sort by Timestamp desc
high severity high confidence

Data Sources

Process: Process Creation Command: Command Execution Windows Registry: Windows Registry Key Modification Sensor Health: Host Status

Required Tables

DeviceProcessEvents DeviceRegistryEvents

False Positives

  • Performance engineers using logman to manage ETW trace sessions for diagnostics
  • System administrators configuring crash dump settings for disk space management on servers
  • Security teams intentionally modifying ETW providers during tuning or testing

Unlock Pro Content

Get the full detection package for T1562.006 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections