
Summary
This detection rule identifies potential unauthorized remote logins conducted by accounts with administrator privileges on Windows systems. It specifically targets events where a login occurs via Remote Desktop Protocol (RDP) with an Event ID of 4624, accompanied by a LogonType of 10, indicating a remote interactive Logon. The rule focuses on usernames that start with 'Admin', which is a typical naming convention for administrative accounts, combined with the use of the 'Negotiate' authentication package. To reduce potential false positives, it emphasizes internal policies that restrict the use of administrator accounts to secondary access, ensuring these accounts are not utilized for everyday tasks. The low severity level indicates that while this is a noteworthy event, it may also represent legitimate administrative activities. Awareness of such login patterns is crucial for monitoring potential lateral movements within a network.
Categories
- Windows
- Cloud
- Infrastructure
Data Sources
- User Account
- Logon Session
- Windows Registry
Created: 2017-10-29