
Summary
The 'Remote Event Log Recon' detection rule is designed to identify unauthorized remote RPC (Remote Procedure Call) attempts to access event log information using the RPC Firewall application. The rule specifically monitors for certain Event IDs and Interface UUIDs that correlate with event log queries, namely EventID 3 from the EventLog service labeled as 'RPCFW'. It captures attempts made via the specified UUIDs which are indicative of surveillance or reconnaissance activities in the environment. By deploying this rule, security teams can mitigate the risk of lateral movement within the network by detecting and blocking suspicious RPC calls before they can be executed. Given the high level of risk associated with unauthorized access to event logs, this detection rule serves as a crucial component of a comprehensive security strategy.
Categories
- Network
- Endpoint
- Windows
Data Sources
- Application Log
- Network Traffic
Created: 2022-01-01