Windows active directory user assigned right to control user objects

This rule is part of a beta feature. To learn more, contact Support.
Esta página aún no está disponible en español. Estamos trabajando en su traducción.
Si tienes alguna pregunta o comentario sobre nuestro actual proyecto de traducción, no dudes en ponerte en contacto con nosotros.

Goal

Detects assignment of delegation privileges to user accounts that enable control over other user objects in Active Directory.

Strategy

This rule monitors Windows Security Audit events, where @evt.id is 4704 when SeEnableDelegationPrivilege is assigned to a user account. This privilege allows a user to enable computer and user accounts to be trusted for delegation, which can be abused by attackers to impersonate other users and escalate privileges within the domain. The SeEnableDelegationPrivilege is typically reserved for highly privileged service accounts and should rarely be assigned to regular user accounts.

Triage and response

  • Verify if the privilege assignment on {{host}} was authorized and follows proper change management procedures.
  • Review the target user account to determine if it requires delegation privileges for legitimate business functions.
  • Check for subsequent delegation configuration changes or suspicious authentication activity from the affected account.
  • Examine the source of the privilege assignment to ensure it came from authorized administrative personnel.
  • Monitor for potential abuse of the delegation privilege to impersonate other users or access sensitive resources.