
Summary
The Uncommon Outbound Kerberos Connection detection rule is a security mechanism designed to identify atypical outbound network activities using the Kerberos protocol, specifically targeting connections on the default Kerberos port (88). This rule highlights potential indicators of malicious lateral movement or initial stages of privilege escalation through delegation techniques. It focuses on monitoring event logs associated with security, specifically Event ID 5156, which captures instances of allowed outbound connections. The detection logic filters out benign applications, such as system processes and major web browsers, that may generate similar connection signals. Thus, it attempts to reduce false positives by excluding connections initiated by known browsers like Chrome and Firefox, as well as application servers like Tomcat. The rule operates within the Windows security framework and emphasizes the necessity of establishing a baseline for normal operations to efficiently identify genuine threats. This rule was authored by Ilyas Ochkov from oscd.community, with a release date in October 2019, and it has undergone modifications up to March 2024 to ensure it remains relevant and effective against evolving threats.
Categories
- Windows
- Network
- Endpoint
Data Sources
- Windows Registry
- Network Traffic
- Application Log
Created: 2019-10-24