SigmaHQ/rules/windows/builtin/win_susp_interactive_logons.yml
2018-07-24 07:50:32 +02:00

30 lines
660 B
YAML

title: Interactive Logon to Server Systems
description: Detects interactive console logons to
author: Florian Roth
tags:
- attack.lateral_movement
- attack.t1078
logsource:
product: windows
service: security
detection:
selection:
EventID:
- 528
- 529
- 4624
- 4625
LogonType: 2
ComputerName:
- '%ServerSystems%'
- '%DomainControllers%'
filter:
LogonProcessName: Advapi
ComputerName: '%Workstations%'
condition: selection and not filter
falsepositives:
- Administrative activity via KVM or ILO board
level: medium