Uncommon Connection to Active Directory Web Services

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects uncommon network connections to the Active Directory Web Services (ADWS) from processes not typically associated with ADWS management.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "sa_network_connection" AND (((IS_INITIATED = "true" AND DEST_PORT = "9389") AND ((PROCESSNAME != "c:\program files\microsoft monitoring agent" AND (((PROCESSNAME notstartswith "c:\program files\powershell\7\pwsh.exe" AND PROCESSNAME notstartswith "c:\program files\powershell\7-preview\pwsh.ex") AND PROCESSNAME notstartswith "c:\windows\system32\windowspowershell") AND PROCESSNAME notstartswith "c:\windows\syswow64\windowspowershell")) AND PROCESSNAME != "c:\windows\system32\dsac.exe"))) select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.PROCESSNAME,Action1.DESTINATIONHOST,Action1.DESTINATION_IPV6,Action1.DEST_IP,Action1.SOURCEHOST,Action1.SOURCE_IP,Action1.SOURCE_IPV6

Detection

Execution Mode

realtime

Log Sources

Active Directory

Author

@kostastsale