heroui logo

Windows Set Account Password Policy To Unlimited Via Net

Splunk Security Content

View Source
Summary
This analytic rule is designed to detect instances in which the command-line tool net.exe is used to alter user account password policies, specifically by setting passwords to be non-expiring. It focuses on command-line parameters such as '/maxpwage:unlimited' or '/maxpwage:49710', which allow for the non-expiration of passwords. Detection is enabled through telemetry collected by Endpoint Detection and Response (EDR) agents that log process creation events, alongside relevant system logs like Sysmon and Windows Event Logs. The significance of this activity lies in its potential implications; such changes can signify malicious intentions, including attempts to establish persistence on compromised accounts, elevate privileges, evade security measures, or engage in lateral movement across a network. If this behavior is confirmed to be malicious, it could enable attackers to maintain prolonged access to sensitive information, thereby exacerbating the risk of data breaches and unauthorized access.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • Windows Registry
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1489
Created: 2025-01-13