
Summary
The 'Windows Multiple Accounts Disabled' rule identifies instances where more than five unique Windows accounts are disabled within a ten-minute window, as captured by Event Code 4725 from Windows Security Event Logs. The rule processes event logs using a Splunk search query that aggregates events in ten-minute intervals to count the number of disabled accounts per time segment. The ability to detect multiple account disablements within a brief timeframe is crucial, as it may signify either internal policy violations or malicious activity by external actors attempting to disrupt services. If deemed malicious, the fallout of such actions might result in widespread account lockouts, significantly impairing user access and disrupting business functions. Organizations should ensure proper configurations, including enabling specific auditing settings on Domain Controllers, to effectively utilize this detection rule. Ultimately, this analytic serves as a critical control for monitoring and mitigating potential security threats related to user account management within Windows environments.
Categories
- Endpoint
Data Sources
- Windows Registry
- User Account
- Logon Session
ATT&CK Techniques
- T1098
- T1078
Created: 2024-11-13