
Summary
This rule is designed to detect modifications to certificates within Active Directory Certificate Authorities (AD CA), which can be an indication of malicious activity by threat actors such as APT29. The logic is based on specific Windows Event IDs associated with certificate modifications. Adversaries may exploit these modifications to create or alter certificates for ongoing user or computer access, thereby compromising system integrity and enabling further attacks within the network. The rule utilizes the Splunk query to cross-reference events related to certificate changes (Event Codes 4890, 4891, 4892, 4882), providing a comprehensive view of any suspicious activities surrounding certificate management processes. The detections rely on Windows event logs, making it crucial for endpoint monitoring in Windows environments.
Categories
- Windows
- On-Premise
- Infrastructure
Data Sources
- Windows Registry
- Application Log
- Active Directory
ATT&CK Techniques
- T1556
Created: 2025-07-02