Detection rules › By event
Microsoft-Windows-Security-Auditing event 4624
Sigma (14)
- Admin User Remote Logon
- DiagTrackEoP Default Login Username
- External Remote RDP Logon from Public IP
- External Remote SMB Logon from Public IP
- Hacktool Ruler
- Metasploit SMB Authentication
- Outgoing Logon with New Credentials
- Pass the Hash Activity 2
- Potential Access Token Abuse
- Potential Privilege Escalation via Local Kerberos Relay over LDAP
- RDP Login from Localhost
- RottenPotato Like Attack Pattern
- Successful Account Login Via WMI
- Successful Overpass the Hash Attempt
Elastic (11)
- Account Password Reset Remotely
- Multiple Logon Failure Followed by Logon Success
- Potential Account Takeover - Logon from New Source IP
- Potential Account Takeover - Mixed Logon Types
- Potential Computer Account NTLM Relay Activity
- Potential Kerberos Relay Attack against a Computer Account
- Potential NTLM Relay Attack against a Computer Account
- Potential Pass-the-Hash (PtH) Attempt
- Process Creation via Secondary Logon
- Remote Windows Service Installed
- Service Creation via Local Kerberos Authentication
Splunk (11)
- Detect Password Spray Attack Behavior From Source
- Detect Password Spray Attack Behavior On User
- Unusual Number of Remote Endpoint Authentication Events
- Windows AD Replication Request Initiated by User Account
- Windows AD Replication Request Initiated from Unsanctioned Location
- Windows AD Short Lived Domain Controller SPN Attribute
- Windows Identify PowerShell Web Access IIS Pool
- Windows Kerberos Local Successful Logon
- Windows Local Administrator Credential Stuffing
- Windows Rapid Authentication On Multiple Hosts
- Windows RDP Login Session Was Established