- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects the creation of a hidden local user account, which is often used by attackers for persistence and privilege escalation.
This detection monitors Windows Security event logs for Event ID 4720 (A user account was created) with specific focus on accounts that end with a dollar sign ($
). The detection excludes the legitimate HomeGroupUser$ account while looking for other accounts with the $ suffix.
Hidden user accounts typically have names ending with “$” to mimic system accounts, making them less visible in user interfaces and management tools. This naming convention is an evasion technique used by attackers to blend their persistence mechanisms with legitimate system accounts.
{{host}}
system where the hidden user account was created.TargetUserName
field.SubjectUserName
field.UserAccountControl
attribute to further conceal the account.