You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
name: Windows Chrome Auto-Update Disabled via Registry
2
2
id: 619eac6c-0f03-4699-ae29-5f337877bcf9
3
3
version: 1
4
-
date: '2025-12-17'
4
+
date: '2026-01-12'
5
5
author: Teoderick Contreras, Splunk
6
6
status: production
7
7
type: Anomaly
8
-
description: The following analytic detects modifications to Windows registry keys that disable Google Chrome auto-updates. Changes to keys such as DisableAutoUpdateChecksCheckboxValue = 1, Update{8A69D345-D564-463C-AFF1-A69D9E530F96} = 0, UpdateDefault = 0, and AutoUpdateCheckPeriodMinutes = 0 can prevent Chrome from receiving security updates. This behavior may indicate attempts to bypass update policies, maintain unauthorized extensions, or facilitate malware persistence. Monitoring these registry changes helps identify potential policy violations or malicious activity targeting browser security.
8
+
description: |
9
+
The following analytic detects modifications to Windows registry values that disable Google Chrome auto-updates.
10
+
Changes to values such as DisableAutoUpdateChecksCheckboxValue = 1, Update{8A69D345-D564-463C-AFF1-A69D9E530F96} = 0, UpdateDefault = 0, and AutoUpdateCheckPeriodMinutes = 0 can prevent Chrome from receiving security updates.
11
+
This behavior may indicate attempts to bypass update policies, maintain unauthorized extensions, or facilitate malware persistence.
12
+
Monitoring these registry changes helps identify potential policy violations or malicious activity targeting browser security.
9
13
data_source:
10
-
- Sysmon EventID 13
11
-
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Registry
12
-
13
-
where Registry.registry_path = "*\\Google\\Update*" AND
14
-
(Registry.registry_value_name = "DisableAutoUpdateChecksCheckboxValue" AND Registry.registry_value_data = 0x00000001) OR
15
-
(Registry.registry_value_name = "Update{8A69D345-D564-463C-AFF1-A69D9E530F96}" AND Registry.registry_value_data = 0x00000000) OR
16
-
(Registry.registry_value_name = "UpdateDefault" AND Registry.registry_value_data = 0x00000000) OR
17
-
(Registry.registry_value_name = "AutoUpdateCheckPeriodMinutes" AND Registry.registry_value_data = 0x00000000)
18
-
19
-
by Registry.action Registry.dest Registry.process_guid Registry.process_id Registry.registry_hive Registry.registry_path
To successfully implement this search, you need to be ingesting
28
45
logs with the registry value name, registry path, and registry value data from your
29
46
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
30
47
Sysmon TA. https://splunkbase.splunk.com/app/5709
31
-
known_false_positives: IT administrators intentionally disabling auto-updates in managed environments for testing, compatibility, or deployment purposes.
48
+
known_false_positives: |
49
+
IT administrators intentionally disabling auto-updates in managed environments for testing, compatibility, or deployment purposes.
name: Windows Chrome Enable Extension Loading via Command-Line
2
2
id: da355155-1d23-48f9-bf95-e534ae273ab0
3
3
version: 1
4
-
date: '2025-12-17'
4
+
date: '2026-01-12'
5
5
author: Teoderick Contreras, Splunk
6
6
status: production
7
7
type: Anomaly
8
-
description: The following analytic detects instances where Google Chrome is started with the --disable-features=DisableLoadExtensionCommandLineSwitch flag, effectively enabling the loading of extensions via the command line. This may indicate attempts to bypass enterprise extension policies, load unauthorized or malicious extensions, or manipulate browser behavior. Monitoring this activity helps identify potential security policy violations, malware persistence techniques, or other suspicious Chrome modifications.
8
+
description: |
9
+
The following analytic detects instances where Google Chrome is started with the --disable-features=DisableLoadExtensionCommandLineSwitch flag, effectively enabling the loading of extensions via the command line.
10
+
This may indicate attempts to bypass enterprise extension policies, load unauthorized or malicious extensions, or manipulate browser behavior.
11
+
Monitoring this activity helps identify potential security policy violations, malware persistence techniques, or other suspicious Chrome modifications.
9
12
data_source:
10
13
- Sysmon EventID 1
11
14
- Windows Event Log Security 4688
12
15
- CrowdStrike ProcessRollup2
13
-
search: '| tstats `security_content_summariesonly` min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes
14
-
where Processes.process_name = "Chrome.exe" Processes.process= "*--disable-features=DisableLoadExtensionCommandLineSwitch*"
16
+
search: |
17
+
| tstats `security_content_summariesonly` min(_time) as firstTime max(_time) as lastTime
Copy file name to clipboardExpand all lines: detections/endpoint/windows_chrome_extension_allowed_registry_modification.yml
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -1,21 +1,21 @@
1
1
name: Windows Chrome Extension Allowed Registry Modification
2
2
id: 2846089a-ffe9-4881-a2a2-43f3be2b8cc7
3
3
version: 1
4
-
date: '2025-12-17'
4
+
date: '2026-01-12'
5
5
author: Teoderick Contreras, Splunk
6
6
status: production
7
7
type: Anomaly
8
8
description: The following analytic detects modifications to the Windows registry keys that control the Chrome Extension Install Allowlist. Unauthorized changes to these keys may indicate attempts to bypass Chrome extension restrictions or install unapproved extensions. This detection helps identify potential security policy violations or malicious activity targeting Chrome extension settings.
9
9
data_source:
10
-
- Sysmon EventID 13
11
-
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Registry
10
+
- Sysmon EventID 13
11
+
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Registry
12
12
where Registry.registry_path = "*\\Google\\Chrome\\ExtensionInstallAllowlist*"
13
13
by Registry.action Registry.dest Registry.process_guid Registry.process_id Registry.registry_hive Registry.registry_path
0 commit comments