Detection rules › By event
Microsoft-Windows-Security-Auditing event 4625
Sigma (4)
Elastic (6)
Splunk (9)
- Detect Password Spray Attack Behavior From Source
- Detect Password Spray Attack Behavior On User
- Detect Password Spray Attempts
- Windows Identify PowerShell Web Access IIS Pool
- Windows Local Administrator Credential Stuffing
- Windows Multiple Users Failed To Authenticate From Process
- Windows Multiple Users Remotely Failed To Authenticate From Host
- Windows Unusual Count Of Users Failed To Authenticate From Process
- Windows Unusual Count Of Users Remotely Failed To Auth From Host