heroui logo

Password Policy Discovery With Get-AdDefaultDomainPasswordPolicy

Sigma Rules

View Source
Summary
This detection rule is focused on identifying PowerShell activity that involves the usage of the `Get-AdDefaultDomainPasswordPolicy` cmdlet, which is commonly utilized to retrieve the default password policy settings for Active Directory domains. Detecting this type of activity is crucial since attackers may leverage this information as part of their reconnaissance phase to exploit password policy weaknesses in an environment. The rule specifies that logging must be enabled for the script block to capture the relevant activities. Any detected usage of `Get-AdDefaultDomainPasswordPolicy` in PowerShell scripts will trigger this rule, providing alerts for potential unauthorized access or activities conducted by malicious actors. However, organizations should be aware of legitimate use cases for this command as it is commonly employed by administrators for policy inspections.
Categories
  • Windows
  • Identity Management
  • On-Premise
Data Sources
  • Script
  • Logon Session
ATT&CK Techniques
  • T1201
Created: 2022-03-17