
Summary
This rule is designed to detect tampering with the 'DsrmAdminLogonBehavior' registry value, which is critical for maintaining the security of Directory Services Restore Mode (DSRM) on Windows Domain Controllers. The DSRM account is a local administrator account used for recovery tasks, and its settings greatly influence how it can be accessed during various states of the system. The three possible values for 'DsrmAdminLogonBehavior' dictate whether the admin account can only log in under specific conditions (value 0 or 1) or under any condition (value 2). Unauthorized modifications to this registry value could allow an attacker to exploit the DSRM account better, thereby gaining persistence or unauthorized access to Active Directory. This rule aims to flag any changes to this registry setting that might indicate malicious intent. Such changes could indicate that an attacker is attempting to weaken the security posture of the AD environment by allowing unfettered access via the DSRM account.
Categories
- Windows
- Endpoint
- Infrastructure
- Identity Management
Data Sources
- Windows Registry
Created: 2024-07-11