
Summary
This analytic rule monitors for an increase in modifications made to Active Directory (AD) groups or objects, which can signal potential security threats such as unauthorized access attempts or attempts to establish persistence in the environment. By tracking modifications within the Windows Event Log for specific event codes, the rule identifies unusual modification patterns that may compromise the integrity and security of the AD setup. The detection uses statistical methods to determine baseline modification activity and flags instances where the modification count significantly exceeds the average, indicating an outlier event. This helps security teams proactively address suspicious behaviors.
Categories
- Windows
- Endpoint
- Identity Management
Data Sources
- Windows Registry
- Active Directory
- Application Log
ATT&CK Techniques
- T1098
- T1562
Created: 2025-01-21