
Summary
This detection rule identifies instances where a target server fails to generate Kerberos tickets due to the absence of suitable encryption keys. The specific trigger condition involves monitoring for event IDs 16 and 27 from the Microsoft-Windows-Kerberos-Key-Distribution-Center provider. This problem typically arises when a service account or computer account is set to only use DES encryption, while the system is configured (such as in Windows 7) to disable DES encryption for Kerberos authentication. The detection can help network administrators and security professionals pinpoint authentication issues, particularly in environments with mixed encryption standards, thereby preventing potential impacts on service availability and authentication efficacy.
Categories
- Windows
- Endpoint
- Identity Management
Data Sources
- Windows Registry
- Logon Session
- Application Log
Created: 2024-03-07