heroui logo

Windows AD Domain Controller Audit Policy Disabled

Splunk Security Content

View Source
Summary
This detection rule identifies the disabling of audit policies on Windows Active Directory Domain Controllers. It uses Event Code 4719 from the Windows Security Event Logs, which indicates changes to auditing settings, particularly when success or failure auditing is removed. Such changes are significant because they can indicate malicious activity, such as an attacker attempting to evade detection by tampering with important security settings. This kind of behavior raises concerns as it may lead to serious consequences, including potential data breaches, privilege escalation incidents, or full network compromises. Thus, any detection of this event should prompt immediate investigation to ascertain the nature of the change and its origin, particularly focusing on unauthorized access to domain controllers.
Categories
  • Windows
  • Endpoint
  • Identity Management
Data Sources
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1562.001
Created: 2024-11-13