
Summary
The rule "Windows Valid Account With Never Expires Password" is designed to detect attempts to change user account policies to set passwords as non-expiring, utilizing the command-line interface with net.exe and the parameter '/maxpwage:unlimited'. This behavior is critical as it may signal an attacker's attempt to ensure persistent access to compromised accounts. By examining execution data from EDR agents, particularly focusing on the creation and modification of user accounts with non-expiring passwords, this detection can alert security teams about potentially malicious activities that could lead to further exploitation. The rule relies on Sysmon and Windows Event Log data, inspecting process executions related to user account management. However, this rule is deprecated and no longer actively maintained, indicating that security professionals should look for updated rules for effective threat detection.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
- Process
ATT&CK Techniques
- T1489
Created: 2025-01-24