heroui logo

Windows AD Privileged Group Modification

Splunk Security Content

View Source
Summary
This rule monitors modifications to privileged Active Directory (AD) groups by detecting events where users are added to these groups, specifically focusing on Windows Event Log Security event code 4728. The rule utilizes Splunk to filter and analyze these logs, leveraging a lookup table (`admon_groups_def`) which categorizes different AD groups to single out those deemed privileged. When a user is added to a privileged group, the rule triggers and provides alerting messages indicating the involved user, the group modified, and the source user who performed the modification. The implementation requires ingestion of event code 4728 logs alongside the configuration of the lookup for accurate classification of groups. Designed for environments utilizing Splunk for log management, this analytic helps identify potential privilege escalation within Active Directory steering clear of false positives as noted in the known issues section. Furthermore, this is crucial in maintaining security and compliance, especially in cases where unauthorized users may gain elevated access through manipulation of group memberships.
Categories
  • Identity Management
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Active Directory
ATT&CK Techniques
  • T1098
Created: 2025-01-21