heroui logo

Windows AD Domain Replication ACL Addition

Splunk Security Content

View Source
Summary
The "Windows AD Domain Replication ACL Addition" analytic is crafted to detect modifications in permissions that facilitate DCSync attacks in Active Directory environments. By observing Event Code 5136 from the Windows Security Event Log, this rule identifies when specific replication rights—namely, DS-Replication-Get-Changes, DS-Replication-Get-Changes-All, and DS-Replication-Get-Changes-In-Filtered-Set—are assigned. This detection is critical as such permissions signal potential malicious intent, enabling attackers to replicate Active Directory objects and extract confidential data, leading to grave security incidents including privilege escalation and data breaches. To effectively implement this rule, it is crucial that the appropriate auditing settings are enabled and any existing permissions are either verified or whitelisted to avoid false positives.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1484
Created: 2024-12-10