
Windows Unusual Count Of Users Failed To Authenticate From Process
Splunk Security Content
View SourceSummary
The detection rule titled "Windows Unusual Count Of Users Failed To Authenticate From Process" is designed to identify unusual authentication patterns in Windows environments. Specifically, it monitors for a single process attempting to authenticate multiple accounts, which can be indicative of a Password Spraying attack — where attackers attempt to access numerous user accounts using a few common passwords. This rule utilizes Windows Event ID 4625, which tracks failed login attempts, and applies statistical analysis to detect anomalies in the frequency of these failed logins. A significant number of failures by a process could suggest malicious intent as attackers may aim to gain unauthorized access or escalate privileges within an Active Directory domain. Implementing this rule requires proper logging configurations across domain controllers and member servers, specifically ensuring that the `Audit Logon` policy is active. False positives may arise from legitimate security scanning tools or misconfigured environment settings. References for further reading include MITRE ATT&CK technique T1110.003 and official Microsoft documentation on Event ID 4625.
Categories
- Windows
- Endpoint
- Identity Management
Data Sources
- Windows Registry
- Image
ATT&CK Techniques
- T1110
- T1110.003
Created: 2024-11-13