- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects when a Windows replay attack is identified by the system.
This detection monitors Windows event logs for Event ID 4649, which specifically indicates that a replay attack was detected by the security system. The event is generated when Windows identifies an authentication attempt using previously captured credentials or tickets.
A replay attack occurs when an attacker captures authentication traffic and later reuses (or “replays”) it to authenticate as the legitimate user, without needing to know their actual credentials. Windows systems can detect such attacks when timestamps or other indicators in the authentication data reveal that the information has been captured and replayed. This technique is commonly used in attempts to forge or reuse Kerberos tickets for unauthorized access.
{{host}}
where the replay attack was detected.