heroui logo

Windows Multiple Users Failed To Authenticate From Process

Splunk Security Content

View Source
Summary
The detection rule "Windows Multiple Users Failed To Authenticate From Process" identifies potential password spraying attacks by monitoring failed authentication attempts from a source process against multiple user accounts within a designated timeframe. It specifically leverages Windows Event Log 4625, focusing on Logon Type 2 records, which are used for interactive logons. The threshold for alerting is set to 30 unique usernames failing to authenticate within a 5-minute interval. The rule is applicable to domain controllers, member servers, and workstations, indicating significant risk when confirmed as malicious, as it can lead to unauthorized access or privilege escalation within an Active Directory environment. Proper implementation requires the ingestion of Windows Event Logs and appropriate logon auditing configurations.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Windows Registry
  • User Account
ATT&CK Techniques
  • T1110
  • T1110.003
Created: 2024-11-13