heroui logo

Potential Active Directory Enumeration Using AD Module - PsModule

Sigma Rules

View Source
Summary
The detection rule focuses on identifying potential Active Directory enumeration activities via the use of the "Import-Module" cmdlet to load the "Microsoft.ActiveDirectory.Management.dll" library. This module is commonly exploited by attackers to gather information about Active Directory environments, such as user accounts, groups, and other directory objects, without requiring administrative privileges. Detecting this malicious activity is crucial for securing Active Directory implementations, especially as it typically signals reconnaissance actions that could lead to more severe attacks. The rule implements a straightforward detection mechanism that triggers alerts whenever the specified cmdlet and DLL are invoked in tandem, indicating an attempt to leverage the Active Directory PowerShell module for unauthorized enumeration. This rule is particularly important because it assists in early detection of potential intrusions, allowing security teams to respond proactively before attackers can gather critical information.
Categories
  • Windows
  • Identity Management
Data Sources
  • Module
  • Process
Created: 2023-01-22