heroui logo

Group Policy Abuse for Privilege Addition

Sigma Rules

View Source
Summary
This detection rule identifies modifications to Group Policy Object (GPO) attributes that are used to escalate privileges within a Windows environment. Specifically, it monitors for changes to the attributes 'gPCMachineExtensionNames' which are associated with adding users to local admin groups. The detection relies on capturing event ID 5136, which corresponds to changes in directory service objects, and focuses on specific GUID values that are identified as being related to privileged access. The rule necessitates prior configuration of the 'Audit Directory Service Changes' policy to ensure that relevant events are logged. This is critical in order to detect unauthorized or malicious privilege escalation attempts effectively.
Categories
  • Windows
  • Identity Management
  • Endpoint
Data Sources
  • User Account
  • Active Directory
  • Windows Registry
Created: 2024-09-04