Windows active directory privileged users or groups reconnaissance

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects reconnaissance activity targeting privileged Active Directory user accounts and groups. Alerts when multiple distinct privileged objects are accessed by a single user.

Strategy

This rule monitors Windows Security Audit events, where @evt.id is 4661 for handle-to-object operations targeting Security Accounts Manager (SAM) user or group objects. The detection focuses on access attempts to well-known privileged group security identifiers (SIDs), including Domain Admins (-512), Guest (-501), Administrator (-500), Print Operators (-550), Enterprise Admins (-519), Schema Admins (-518), Domain Controllers (-516), and objects containing “admin” in their names. This pattern indicates potential reconnaissance activity where attackers enumerate privileged accounts to identify high-value targets for lateral movement or privilege escalation.

Triage and response

  • Examine the specific privileged objects accessed by {{@Event.EventData.Data.SubjectUserName}} on {{host}} to understand the scope of the reconnaissance activity.
  • Review the user’s legitimate business role and determine if they have authorized reasons to access multiple privileged Active Directory objects.
  • Check for subsequent authentication attempts or privilege escalation activities from the same user account following this reconnaissance.
  • Analyze the timing and pattern of object access to distinguish between automated tools versus manual enumeration.
  • Investigate whether the user account may have been compromised by reviewing recent authentication logs and unusual activity patterns.