
Summary
This detection rule is designed to monitor changes to the 'LocalAccountTokenFilterPolicy' registry key in Windows systems. Specifically, it observes modifications that can potentially disable Remote User Account Control (UAC) filtering for local accounts. When set to a value of '1', local admin accounts are granted full administrative rights when connecting remotely, which can expose the system to vulnerabilities such as Pass the Hash attacks. The rule utilizes PowerShell logs to detect events where the registry key is modified or when processes are executed with commands that alter this key. By analyzing specific Event Codes (4103 and 4104) related to registry modifications, the rule identifies instances that pose security risks due to the lowered filtering protections for local accounts. This detection aims to mitigate malicious exploitation of local account privileges by monitoring registry changes that could lead to unauthorized access or escalation of privileges.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1112
- T1550.002
Created: 2024-02-09