- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects an instance where a non-machine account is attempting to perform Active Directory (AD) replication.
This detection monitors Windows Security event logs for occurrences of Event ID 4662 (An operation was performed on an object) with specific Access Mask and Properties values that indicate directory replication attempts. The detection looks for access mask 0x100
(Control Access) and targeted directory service replication GUIDs. The detection excludes normal machine accounts (which end with ‘$’) and Microsoft Online accounts (starting with ‘MSOL_’) as these are legitimate service accounts expected to perform replication.
DCSync is a technique commonly used in identity-based attacks where an adversary with sufficient privileges requests account data from a domain controller using the AD replication protocol.
{{host}}
domain controller that recorded the AD replication event.SubjectUserName
field in the event data.