
Summary
The 'Windows Export Certificate' rule is designed to detect the unauthorized export of certificates from the Windows Certificate Store, which can pose a significant security risk if exploited by malicious actors. The rule utilizes data from the Windows Certificate Services Client Lifecycle logs, specifically targeting event ID 1007 to track when certificates are exported. By monitoring such exports, organizations can identify potential security breaches that may arise from certificates being used to gain unauthorized access to sensitive systems or data, such as Virtual Private Networks (VPNs) or internal resources. The implementation of this analytic requires careful data collection from the appropriate Windows event logs. It is essential to consider the potential for false positives, especially from automated processes regularly exporting certificates, necessitating a review of these alerts to determine their legitimacy. The detection model incorporates searches that summarize certificate export events by various parameters, including the exporting user and involved systems, providing a detailed overview of unusual certificate activity.
Categories
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1553.004
- T1552.004
- T1552
- T1649
Created: 2024-11-13