heroui logo

Windows Steal Authentication Certificates Certificate Request

Splunk Security Content

View Source
Summary
This detection rule analyzes events related to certificate requests from Active Directory Certificate Services (AD CS), specifically tracking Event ID 4886, which indicates that a new certificate has been requested. The significance of monitoring these requests lies in their potential use by attackers engaged in credential theft or lateral movement within an organization. Unauthorized requests can allow an attacker to impersonate users, thereby gaining access to sensitive resources or establishing persistent footholds in the network. The analytic promotes a comprehensive approach by correlating these events with other suspicious activities, facilitating the identification of possibly malicious actions. Enhanced logging is necessary for implementation, and attention to false positives, which may arise from standard certificate request activities, is also crucial to maintaining effective anomaly detection without overwhelming security teams with irrelevant alerts.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1649
Created: 2024-11-13