
Summary
This rule detects spikes in user account management events, using machine learning to identify unusual activities such as account creation, modification, or deletion that may suggest privilege escalation attempts or unauthorized access. Configured to analyze data from Windows logs collected through the Privileged Access Detection integration and Elastic Defend, it evaluates actions taken on user accounts over a defined time frame. The rule triggers when the anomaly threshold is exceeded, signaling potential malicious behavior that requires immediate investigation. Analysts are encouraged to examine user behavior patterns, timestamps of events, and surrounding conditions, with recommendations for remediation and adjustments for known false positives related to routine administrative activities.
Categories
- Windows
- Cloud
- Endpoint
Data Sources
- User Account
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1068
- T1078
Created: 2025-02-18