
Summary
This analytic detection rule identifies rapid authentication events where a source computer authenticates to 30 or more remote hosts within a 5-minute timeframe, using Windows Event Log security data (Event ID 4624 with LogonType 3). Such behavior may signal lateral movement or network enumeration by an attacker, and could enable unauthorized access to multiple systems, risking sensitive data exposure and privilege escalation. The implementation requires ingestion of Windows Event Logs from domain controllers and member systems, with the Advanced Security Audit policy set to 'Audit Logon'. The rule provides insights into potential adversarial actions consistent with MITRE ATT&CK framework techniques, specifically T1135, concerning improper access to file shares.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1135
- T1003.002
Created: 2024-11-13