heroui logo

Suspicious SYSVOL Domain Group Policy Access

Sigma Rules

View Source
Summary
This detection rule is designed to identify suspicious access to Domain Group Policies that are stored in the SYSVOL directory of a Windows domain. SYSVOL is a critical file system structure that contains public files of domains, including Group Policies which dictate user and computer settings across the domain network. If unauthorized access to these policies is detected, it may indicate a potential credential theft or misconfiguration in security practices. The rule utilizes process creation logs to monitor command lines that contain key directory paths indicative of SYSVOL access. The detection triggers when a process is created with command-line arguments containing both '\SYSVOL\' and '\policies\', which are paths that could signify attempts to read or modify Group Policy objects. False positives are anticipated from legitimate administrative activities, thus careful analysis is advised when alerts are triggered.
Categories
  • Windows
  • Endpoint
  • Identity Management
Data Sources
  • Process
Created: 2018-04-09