
Summary
This detection rule identifies users who authenticate with special privileges on 30 or more remote Windows endpoints within a 5-minute period, an action traced through Windows Security Event ID 4672. Such behavior can indicate lateral movement or remote execution by potential attackers, who may exploit these privileges for greater control over the network. If confirmed as malicious, this could lead to serious risk events such as privilege escalation and data breaches. Consequently, it is crucial for security teams to tune detection thresholds according to their unique environments to minimize false positives.
Categories
- Windows
- Endpoint
- Identity Management
- Cloud
- Infrastructure
Data Sources
- Windows Registry
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1087
- T1021.002
- T1135
- T1078
Created: 2024-12-10