SigmaHQ/rules/windows/builtin/win_susp_failed_logon_reasons.yml

22 lines
626 B
YAML
Raw Normal View History

title: Account Tampering - Suspicious Failed Logon Reasons
description: This method uses uncommon error codes on failed logons to determine suspicious activity and tampering with accounts that have been disabled or somehow restricted.
author: Florian Roth
2017-02-16 17:02:26 +00:00
logsource:
2017-02-19 10:08:23 +00:00
product: windows
2016-12-24 11:23:47 +00:00
detection:
2016-12-26 01:21:55 +00:00
selection:
EventLog: Security
EventID:
- 4625
- 4776
Status:
- 0xC0000072
- 0xC000006F
- 0xC0000070
- 0xC0000413
- 0xC000018C
condition: selection
2016-12-24 11:23:47 +00:00
falsepositives:
- User using a disabled account
2017-02-16 17:02:26 +00:00
level: high