heroui logo

Unusual Group Name Accessed by a User

Elastic Detection Rules

View Source
Summary
This detection rule identifies potential privileges escalation activities by analyzing unusual accesses to group names by users, leveraging machine learning techniques to flag significant deviations from user behavior in the context of privileged operations. The rule is active and uses a threshold of 75 for identifying anomalies, indicating that a user accessed a group that is unlikely to be associated with their regular operational tasks. By monitoring activities, it enhances security by aiming to catch unauthorized access early, thus preventing potential exploits. The integration requires Windows log collection and assets from the Privileged Access Detection (PAD) integration, signaling the need for a robust setup involving several components to ensure reliable performance of the detection capabilities.
Categories
  • Endpoint
  • Windows
  • On-Premise
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1068
  • T1078
  • T1069
Created: 2025-02-18