Detection rules › Elastic

Kerberos Pre-authentication Disabled for User

Author
Elastic
Source
upstream

Identifies the modification of an account's Kerberos pre-authentication options. An adversary with GenericWrite/GenericAll rights over the account can maliciously modify these settings to perform offline password cracking attacks such as AS-REP roasting.

MITRE ATT&CK coverage

TacticTechniques
Initial AccessT1078 Valid Accounts, T1078.002 Valid Accounts: Domain Accounts
PersistenceT1078 Valid Accounts, T1078.002 Valid Accounts: Domain Accounts, T1098 Account Manipulation
Privilege EscalationT1078 Valid Accounts, T1078.002 Valid Accounts: Domain Accounts, T1098 Account Manipulation
Defense EvasionT1078 Valid Accounts, T1078.002 Valid Accounts: Domain Accounts, T1562 Impair Defenses
Credential AccessT1558 Steal or Forge Kerberos Tickets, T1558.004 Steal or Forge Kerberos Tickets: AS-REP Roasting

Event coverage

ProviderEvent IDTitle
Security-Auditing4738A user account was changed.

Stages and Predicates

Stage 1: eql:any

winlog.event_data.NewUACList:"USER_DONT_REQUIRE_PREAUTH"

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
winlog.event_data.NewUACListeq
  • USER_DONT_REQUIRE_PREAUTH

Neighbors

Broader alternatives (more inclusive than this rule)

These rules match a superset of what this rule catches. They cover the same events plus more. Use them if you want wider coverage and can absorb more false positives.