ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: PR018.003
  • Created: 23rd July 2024
  • Updated: 08th April 2025
  • Platforms: Windows, Linux, MacOS,
  • Contributor: The ITM Team

Unauthorized Manipulation of Anti-Virus Exclusions

A subject abuses their access or conducts unapproved changes to set exclusions within an anti-virus solution, allowing known malicious files to be executed from a specified location on disk.

Prevention

ID Name Description
PV033Native Anti-Tampering Protections

Commercial security software may include native anti-tampering protections that prevent attempts to interfere with its operations, such as deleting or renaming required files.

PV002Restrict Access to Administrative Privileges

The Principle of Least Privilege should be enforced, and period reviews of permissions conducted to ensure that accounts have the minimum level of access required to complete duties as per their role.