
Summary
The rule "Spike in Group Management Events" is a detection mechanism that harnesses machine learning to identify unusual spikes in group management activities associated with user accounts, particularly focusing on scenarios that signal potential privilege escalation attempts. By monitoring group management events such as the addition or removal of users from privileged groups, the system can detect activities that deviate from established user behavior patterns. This enables early identification of anomalous actions that could indicate unauthorized access or privilege manipulation.
Categories
- Endpoint
- Windows
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1098
- T1078
Created: 2025-02-18