
Summary
This rule is designed to detect instances when the password policy of a Windows system is being enumerated, which is a technique commonly used by attackers during the reconnaissance phase of an attack. The detection mechanism relies on monitoring event ID 4661, which logs attempts to access security objects. In this case, it focuses specifically on access attempts to the Security Account Manager (SAM) involving an access list that includes the string '%%5392', which corresponds to password policy enumeration attempts. By capturing these events, security teams can identify potential reconnaissance activities that may precede unauthorized access or lateral movement within the network.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Logon Session
- Application Log
Created: 2023-05-19