T1562.013

Disable or Modify Network Device Firewall

Adversaries may disable network device-based firewall mechanisms entirely or add, delete, or modify particular rules in order to bypass controls limiting network usage. Modifying or disabling a network firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. For example, adversaries may add new network firewall rules to allow access to all internal network subnets without restrictions. Adversaries may gain access to the firewall management console via Valid Accounts or by exploiting a vulnerability. In some cases, threat actors may target firewalls that have been exposed to the internet. This technique was used by APT38 to create firewall exemptions on specific ports, and by threat actors exploiting Fortinet FortiGate vulnerabilities (CVE-2024-55591) to modify firewall rules before deploying LockBit ransomware.

Microsoft Sentinel / Defender
kusto
let FirewallCommands = dynamic([
  "netsh advfirewall", "netsh firewall",
  "Set-NetFirewallProfile", "New-NetFirewallRule",
  "Remove-NetFirewallRule", "Set-NetFirewallRule",
  "Disable-NetFirewallRule", "netsh advfirewall set allprofiles state off",
  "netsh advfirewall firewall add rule",
  "iptables -F", "iptables -P INPUT ACCEPT",
  "iptables -P FORWARD ACCEPT", "iptables -D",
  "ufw disable", "firewall-cmd --permanent --add-port",
  "nft flush ruleset", "nft delete"
]);
let NetworkDeviceSyslog = dynamic([
  "firewall rule", "access-list", "security-policy",
  "policy delete", "rule delete", "permit any any",
  "action accept", "config firewall policy"
]);
union
(
  DeviceProcessEvents
  | where Timestamp > ago(24h)
  | where ProcessCommandLine has_any (FirewallCommands)
  | extend IsFirewallDisable = ProcessCommandLine has_any ("state off", "set allprofiles state off", "Enabled False", "-F", "flush", "disable")
  | extend IsRuleAdd = ProcessCommandLine has_any ("add rule", "New-NetFirewallRule", "-A INPUT", "-I INPUT", "--add-port", "nft add")
  | extend IsRuleDelete = ProcessCommandLine has_any ("delete rule", "Remove-NetFirewallRule", "-D INPUT", "nft delete")
  | extend AllowsAny = ProcessCommandLine has_any ("action=allow", "-j ACCEPT", "ACCEPT", "permit", "allow")
  | project Timestamp, DeviceName, AccountName, FileName,
           ProcessCommandLine, InitiatingProcessFileName,
           InitiatingProcessCommandLine,
           IsFirewallDisable, IsRuleAdd, IsRuleDelete, AllowsAny,
           DetectionType="HostFirewallManipulation"
),
(
  Syslog
  | where TimeGenerated > ago(24h)
  | where SyslogMessage has_any (NetworkDeviceSyslog)
  | where SyslogMessage has_any ("delete", "disable", "permit any", "accept", "removed", "modified")
  | project TimeGenerated, Computer, HostName, Facility,
           SeverityLevel, SyslogMessage,
           DetectionType="NetworkDeviceFirewallChange"
),
(
  CommonSecurityLog
  | where TimeGenerated > ago(24h)
  | where DeviceVendor in ("Fortinet", "Palo Alto Networks", "Cisco", "Check Point")
  | where Activity has_any ("policy", "rule", "firewall", "security")
  | where Activity has_any ("delete", "modify", "disable", "create", "add")
  | project TimeGenerated, DeviceVendor, DeviceProduct,
           SourceUserName, SourceIP, Activity, Message,
           DetectionType="NetworkFirewallPolicyChange"
)
| sort by TimeGenerated desc
high severity medium confidence

Data Sources

Process: Process Creation Command: Command Execution Firewall: Firewall Rule Modification Firewall: Firewall Disable Network Traffic: Network Traffic Flow

Required Tables

DeviceProcessEvents Syslog CommonSecurityLog

False Positives

  • Network administrators making planned firewall changes during a documented maintenance window — correlate with change management tickets
  • Infrastructure-as-code deployments (Terraform, Ansible, CloudFormation) that modify firewall rules as part of automated provisioning
  • Software installation scripts that add Windows Firewall exceptions for newly installed applications (e.g., SQL Server, IIS, Docker)
  • VPN or remote access solutions that dynamically add firewall rules when users connect (Cisco AnyConnect, GlobalProtect, Tailscale)

Unlock Pro Content

Get the full detection package for T1562.013 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections