
Summary
The 'Crowdstrike Admin Weak Password Policy' detection rule focuses on identifying instances where administrative accounts within the CrowdStrike environment have been configured with weak passwords. Specifically, it searches the `crowdstrike_identities` data source for any alerts regarding user accounts that include the term 'admin' in their display names, and evaluates their associated risk factors. The rule leverages a combination of statistics to determine the count of occurrences, first and last timestamps of these alerts, while filtering for those specifically flagged with a 'WEAK_PASSWORD_POLICY' risk type. The detection aims to enhance security measures by alerting system administrators to potentially compromised accounts due to inadequate password strength, thus enabling timely remediation efforts to protect vital systems and data against unauthorized access. Implementation of this detection rule requires integration with CrowdStrike's Falcon Streaming API to capture logs, and it promotes proactive security measures aligned with modern cybersecurity practices.
Categories
- Endpoint
- Cloud
Data Sources
- User Account
- Cloud Service
ATT&CK Techniques
- T1110
Created: 2024-11-13