
Summary
This rule detects instances of a Windows computer account requesting a Kerberos ticket, which is abnormal behavior since Kerberos tickets are usually requested by user accounts. By monitoring Event Code 4768 in Windows Security Event Logs, it identifies requests where the TargetUserName ends with a dollar sign ($), indicating that a computer account made the request. Such activity raises concerns as it may signal attempts to exploit Kerberos-based attacks, often using tools like KrbRelayUp, leading to unauthorized access and potential lateral movement within a network. The rule aims to identify these unusual computer account request patterns, thereby enhancing the security posture by alerting potentially malicious activities.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Windows Registry
- Windows Registry
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1558
Created: 2024-11-13