heroui logo

User or Group Creation/Modification

Elastic Detection Rules

View Source
Summary
This detection rule, authored by Elastic, is designed to monitor Linux systems for events related to user or group account creation and modifications, which can indicate potential persistence tactics employed by threat actors. Utilizing the `auditd_manager` integration, it leverages audit logs to capture these specific activities. The rule operates on data from Auditd Manager, which works with the Linux Audit Framework to generate and manage audit events. It specifically flags events where users or groups are created or changed successfully, associated with specific actions like 'added-user-account' or 'changed-password'. The setup involves configuring audit rules to monitor relevant binaries associated with user and group management, ensuring that pertinent system modifications are logged and actionable alerts are generated. The rule's effectiveness relies on correct installation and configuration of the Auditd Manager integration, along with the addition of specific audit rules. Automating the monitoring and alerting mechanisms helps in identifying anomalies that might indicate unauthorized attempts to create or modify user accounts.
Categories
  • Endpoint
  • Linux
Data Sources
  • User Account
  • Logon Session
  • Process
  • Kernel
  • Network Traffic
ATT&CK Techniques
  • T1136
  • T1136.001
Created: 2024-06-20