
Summary
This detection rule identifies an anomaly involving a significant number of Kerberos service ticket requests (over 30) from a single source IP within a 5-minute span, utilizing Windows Event Log (Event ID 4769). The rule aims to identify suspicious behaviors potentially indicative of lateral movement, unauthorized access, or reconnaissance activities within an Active Directory environment. By focusing on service requests made by computer accounts (as indicated by service names matching a certain pattern), this detection helps catch abnormal access attempts that may signal malicious intent. Potential causes for false positives may include legitimate administrative functions or misconfigured systems, reinforcing the need for context in incident response planning.
Categories
- Endpoint
- Windows
- Network
Data Sources
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1135
- T1078
Created: 2024-11-13