heroui logo

Detect Computer Changed with Anonymous Account

Splunk Security Content

View Source
Summary
This detection rule identifies unauthorized modifications to computer accounts made by anonymous logins in Windows environments. Leveraging critical Windows Security Event Codes (4742 for Computer Change and 4624 for Successful Logon), the rule specifically looks for instances where the TargetUserName is set to "ANONYMOUS LOGON" and LogonType is 3. This scenario raises substantial security concerns because anonymous logins should not have the privileges to alter computer accounts, suggesting potential unauthorized access or vulnerabilities within the system configurations. If this activity is confirmed malicious, it may lead to a heightened level of risk, including privilege escalation and persistent intruder access within the network. Security practitioners should enable auditing for computer account management to track these events effectively, which requires careful configuration of the search parameters to suit individual environments. Organizations are encouraged to monitor these events closely to prevent unauthorized account changes.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1210
Created: 2024-11-13