heroui logo

Windows Create Local Account

Splunk Security Content

View Source
Summary
The "Windows Create Local Account" analytic rule is designed to detect the creation of a new local user account on Windows systems, specifically targeting event ID 4720 from Windows Security Audit logs. The detection of unauthorized local account creation is critical for security operations as it can signify potential unauthorized access attempts or lateral movement within a network by an attacker. The rule leverages the analysis of change data, compiled through the Splunk data model, to identify and alert on this specific event. If this activity is confirmed as malicious, it poses risks such as providing the attacker with persistent access or escalated privileges that compromise sensitive systems and data. Therefore, monitoring for new local accounts is a priority for maintaining the security posture of Windows environments.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1136.001
  • T1136
Created: 2024-11-13