atomic-threat-coverage/detection_rules/win_alert_active_directory_user_control.yml
2019-02-12 04:55:11 +01:00

22 lines
922 B
YAML
Executable File

title: Enabled User Right in AD to Control User Objects
description: Detects scenario where if a user is assigned the SeEnableDelegationPrivilege right in Active Directory it would allow control of other AD user objects.
tags:
- attack.privilege_escalation
- attack.t1078
references:
- https://www.harmj0y.net/blog/activedirectory/the-most-dangerous-user-right-you-probably-have-never-heard-of/
author: '@neu5ron'
logsource:
product: windows
service: security
definition: 'Requirements: Audit Policy : Policy Change > Audit Authorization Policy Change, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Policy Change\Audit Authorization Policy Change'
detection:
selection:
EventID: 4704
keywords:
- 'SeEnableDelegationPrivilege'
condition: all of them
falsepositives:
- Unknown
level: high