heroui logo

Windows AD Privileged Object Access Activity

Splunk Security Content

View Source
Summary
The 'Windows AD Privileged Object Access Activity' analytic rule is designed to detect access attempts to sensitive Active Directory (AD) objects by monitoring for Windows Security Event Code 4662. This event code logs whenever specific privileged AD objects, such as Domain Admins or Enterprise Admins, are accessed. Since these objects are crucial for maintaining the security and integrity of a domain, normal access should be limited primarily to designated accounts or services. Frequent or unauthorized access attempts could signify malicious activities, including enumeration or lateral movement by an attacker, potentially leading to privilege escalation or control over critical domain resources. The rule utilizes Splunk's powerful querying capabilities to filter event codes and extract relevant data regarding such access attempts, allowing for comprehensive monitoring and timely detection of suspicious activities.
Categories
  • Windows
  • Identity Management
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1087
  • T1087.002
Created: 2024-11-13