Windows active directory user assigned right to control user objects

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects assignment of delegation privileges to user accounts that enable control over other user objects in Active Directory.

Strategy

This rule monitors Windows Security Audit events, where @evt.id is 4704 when SeEnableDelegationPrivilege is assigned to a user account. This privilege allows a user to enable computer and user accounts to be trusted for delegation, which can be abused by attackers to impersonate other users and escalate privileges within the domain. The SeEnableDelegationPrivilege is typically reserved for highly privileged service accounts and should rarely be assigned to regular user accounts.

Triage and response

  • Verify if the privilege assignment on {{host}} was authorized and follows proper change management procedures.
  • Review the target user account to determine if it requires delegation privileges for legitimate business functions.
  • Check for subsequent delegation configuration changes or suspicious authentication activity from the affected account.
  • Examine the source of the privilege assignment to ensure it came from authorized administrative personnel.
  • Monitor for potential abuse of the delegation privilege to impersonate other users or access sensitive resources.