heroui logo

NTDS.DIT Created

Sigma Rules

View Source
Summary
This detection rule monitors the creation of a file named "ntds.dit," which is the Active Directory database file on Windows systems. The rule is designed to identify potentially malicious activities that could indicate unauthorized access or compromise of the Active Directory. Given that the ntds.dit file is critical for AD functionality, its creation outside of normal operational procedures may signify a significant security incident, especially in environments where Active Directory is heavily utilized. The detection inspects file creation events and specifically looks for instances where the target filename ends with "ntds.dit." This rule is categorized under low severity, as it might occur in legitimate scenarios, but it warrants attention to prevent potential credential abuse or data theft. False positives are not uncommon and will require follow-up investigations. The rule is a proactive measure for organizations to tighten their security around user account management and credential access.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2023-05-05