
Summary
This detection rule targets the scenario where weak encryption is enabled for user profiles in a Windows environment, highlighting potential vulnerabilities that attackers may exploit, such as Kerberoasting. It focuses on specific event IDs (4738) that indicate changes to user account properties, particularly looking at the User Account Control (UAC) values before and after the change. The rule checks if the old and new UAC values belong to certain weak encryption categories, as indicated by alphanumeric patterns at the end of the values. If weak encryption settings are detected, this could facilitate hash or password cracking, making it vital for organizations to monitor and secure such configurations to prevent unauthorized access to sensitive resources. The detection relies on audit policies related to account management and network security best practices, serving as a critical measure in overall security posture.
Categories
- Windows
Data Sources
- User Account
- Application Log
Created: 2017-07-30