
Summary
The detection rule "Windows AD DSRM Account Changes" identifies changes to the Directory Services Restore Mode (DSRM) account behavior through monitoring specific registry modifications. It specifically checks the registry path "*\\System\\CurrentControlSet\\Control\\Lsa\\DSRMAdminLogonBehavior" to discern alterations that could indicate misuse of the DSRM account. This is critical because improper changes to the DSRM settings can lead to exploitation, allowing attackers persistent access to a Domain Controller, akin to a local admin's privileges, facilitating potential domain-wide compromises and unauthorized access to sensitive information. The rule employs Sysmon EventID logs to correlate registry actions with processes and user activities, aiming to detect malicious configurations that would be a precursor to severe security incidents.
Categories
- Windows
- Endpoint
- Identity Management
Data Sources
- Pod
- Windows Registry
ATT&CK Techniques
- T1098
Created: 2024-11-13