
Summary
This detection rule identifies the creation of new Group Policy Objects (GPOs) within a Windows Active Directory environment. It leverages Windows Event Log Security event IDs 5136 and 5137, specifically focusing on directory service changes that indicate when a GPO is created. GPOs can be weaponized by attackers to escalate privileges or distribute malware, making monitoring their creation critical for cybersecurity. Upon detection of suspicious GPO creation events, it's possible to trace back to the user or process that initiated the action. The rule stipulates the need for enabling the `Audit Directory Service Changes` policy and configuring proper system access control lists to ensure relevant events are logged and monitored effectively.
Categories
- Windows
- Endpoint
- Infrastructure
- Identity Management
Data Sources
- Windows Registry
- Application Log
ATT&CK Techniques
- T1484
- T1484.001
- T1078.002
Created: 2024-11-13