heroui logo

Active Directory Privilege Escalation Identified

Splunk Security Content

View Source
Summary
The 'Active Directory Privilege Escalation Identified' analytic is designed to uncover potential privilege escalation activities within an organization's Active Directory (AD) infrastructure. By correlating multiple analytics from the Active Directory Privilege Escalation analytic story over a defined timeframe, this detection aims to reveal coordinated attempts by adversaries to gain unauthorized elevated privileges. Given the critical nature of AD in managing user access and permissions, detecting such activity is essential for SOC teams to mitigate risks before they escalate into data breaches or wider network compromises. The rule uses advanced querying through Splunk's data model to aggregate risk scores and visualizes the findings to keep security teams informed about abnormal activities that may signify privilege escalation attempts.
Categories
  • Identity Management
  • Windows
  • Endpoint
Data Sources
  • Active Directory
  • Logon Session
  • Network Traffic
ATT&CK Techniques
  • T1484
Created: 2024-11-13