heroui logo

Windows DnsAdmins New Member Added

Splunk Security Content

View Source
Summary
The detection rule titled "Windows DnsAdmins New Member Added" aims to identify the addition of new members to the DnsAdmins group in Active Directory by monitoring Windows Event ID 4732. This high-privilege group enables its members to manage the DNS service on Domain Controllers, which if misused, poses a substantial security risk, allowing potential privilege escalation and control over critical domain services. To effectively implement this detection, security event logs must be ingested, and it's vital to have the 'Audit Security Group Management' policy enabled. The rule is designed to monitor changes to the DnsAdmins group, helping to mitigate risks associated with unauthorized privilege escalations.
Categories
  • Windows
  • Infrastructure
  • Identity Management
Data Sources
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1098
Created: 2024-11-13