mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-08 10:13:57 +00:00
Merge pull request #322 from P4T12ICK/feature/win_user_creation
New Sigma rule detecting local user creation
This commit is contained in:
commit
bdd184a24c
25
rules/windows/builtin/win_user_creation.yml
Normal file
25
rules/windows/builtin/win_user_creation.yml
Normal file
@ -0,0 +1,25 @@
|
||||
title: Detects local user creation
|
||||
description: Detects local user creation on windows servers, which shouldn't happen in an Active Directory environment. Apply this Sigma Use Case on your windows server logs and not on your DC logs.
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1136
|
||||
references:
|
||||
- https://patrick-bareiss.com/detecting-local-user-creation-in-ad-with-sigma/
|
||||
author: Patrick Bareiss
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4720
|
||||
condition: selection
|
||||
fields:
|
||||
- EventCode
|
||||
- Account_Name
|
||||
- Account_Domain
|
||||
falsepositives:
|
||||
- Domain Controller Logs
|
||||
level: high
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user