heroui logo

Unusual Source IP for Windows Privileged Operations Detected

Elastic Detection Rules

View Source
Summary
The rule titled "Unusual Source IP for Windows Privileged Operations Detected" leverages machine learning to identify potential anomalies in privileged access activity, focusing specifically on instances where users perform administrative operations from uncommon source IP addresses. This detection could signify account compromise, misuse of privileges, or unauthorized escalation attempts by adversaries exploiting new network locations. The machine learning job associated with this rule analyzes historical data to set an anomaly threshold of 75, enhancing detection sensitivity. The setup requires integration with the Privileged Access Detection assets and the collection of relevant Windows logs through integrations like Elastic Defend. The guidance for investigating flagged alerts includes reviewing the flagged IPs, user account activities, and correlating with firewall and VPN logs, to provide comprehensive context. The rule’s note emphasizes the importance of validating flagged events, addressing potential false positives, including those arising from remote work dynamics and VPN usage, and suggesting remediation steps if compromises are confirmed, such as isolating affected systems and credential resets.
Categories
  • Windows
  • Endpoint
  • Cloud
Data Sources
  • User Account
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1078
Created: 2025-02-18