
Summary
This rule is designed to detect significant increases in modifications to Active Directory (AD) user objects, which may indicate potential security issues, such as unauthorized access efforts or attempts to manipulate user accounts for malicious purposes. It leverages Windows Event Logs, specifically monitoring events related to user creation, modification, and deletion (EventCodes 4720, 4722, etc.). A statistical analysis is conducted on the frequency of modifications over a 5-minute span, comparing the activity levels against historical averages and standard deviations to identify anomalous behavior. If the detected user modification counts exceed a predefined threshold, the system alerts administrators to investigate further, as such spikes could signify malicious activities aimed at undermining user account integrity within the organization.
Categories
- Windows
- Cloud
- Infrastructure
- Identity Management
Data Sources
- Windows Registry
- Active Directory
- Windows Registry
ATT&CK Techniques
- T1098
- T1562
Created: 2025-01-21