
Summary
This detection rule utilizes machine learning to identify unusual privileged operations occurring on Windows from devices that are not commonly associated with specific users. It works by analyzing patterns of user activity to flag any instances where a user, typically performing privileged operations, accesses the system from an unfamiliar or rarely-used device. Such behavior can indicate potential insider threats, compromised credentials, or unauthorized access attempts. The rule leverages the Privileged Access Detection (PAD) integration to collect relevant data from Windows logs and is designed to function at the baseline level of threat detection for accounts performing privileged actions. Alerts generated by this detection rule can prompt investigations to confirm the legitimacy of the access and mitigate risks associated with privilege escalation.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Application Log
- Logon Session
- User Account
ATT&CK Techniques
- T1078
Created: 2025-02-18