
Summary
The rule 'Windows AD Self DACL Assignment' is designed to monitor the changes in Discretionary Access Control Lists (DACLs) within Active Directory (AD) to identify potentially concerning behavior where a user modifies permissions on their own AD object. The corresponding detection logic utilizes the event logs generated by Windows Security, particularly Event Code 5136, which captures modifications to AD objects, including the assignment of new DACLs. The rule analyzes the changes made to the access controls, particularly focusing on identifying instances where a user is attempting to grant themselves elevated access rights by creating or altering their DACL entries. Specific attributes from the logs, like `OperationType`, `AttributeValue`, and `ObjectDN`, are extracted and processed to detect such changes accurately. The rule employs various lookups to enhance the analysis, providing more context around the changes, such as the type of access granted and the identities involved. Alerts generated will notify administrators of suspicious adjustments, thereby supporting the overall security posture concerning privilege escalation within AD.
Categories
- Identity Management
- Windows
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1484
- T1098
Created: 2025-01-21