heroui logo

Modify Group Policy

Anvilogic Forge

View Source
Summary
The threat detection rule titled 'Modify Group Policy' is designed to identify unauthorized modifications to Group Policy Objects (GPOs) within a Windows Active Directory (AD) environment. Adversaries may exploit GPOs to alter security settings, typically to gain elevated privileges across the domain. This rule targets specific Windows Event Codes indicative of GPO modifications, including event codes such as 5136 (Modifications to GPOs), 5137 (Creation of GPOs), 5138 (Reading GPOs), 5139 (Linking GPOs), and 5141 (Removal of GPO links). The Splunk logic involves pulling endpoint data and filtering for these event codes, presenting key information in a structured table format, including timestamps, hosts, and users involved in the modifications. The rule is associated with advanced persistent threats, such as Black Basta and Conti, highlighting its relevance in contexts of privilege escalation and defense evasion within cyber attacks.
Categories
  • Windows
  • Cloud
  • Infrastructure
  • Identity Management
Data Sources
  • Windows Registry
  • Active Directory
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1484.001
Created: 2024-02-09