MSSQL Suspicious Successful Password Change Activity

Last updated on:

About the rule

Rule Type

Anomaly

Rule Description

Detects repeated successful password change attempts on a MSSQL server, possibly indicating brute-force activity or unauthorized access attempts.

Severity

Attention

Rule Requirement

Criteria

Action1: actionname = "mssql_successful_password_change" | isanomalous(User at an unusual Time) | isanomalous(User with abnormal Count) | isanomalous(Log source at an unusual Time) | isanomalous(Log source with abnormal Count) | isanomalous(Log source with unusual Username) select Action1.HOSTNAME,Action1.INSTANCENAME,Action1.USERNAME,Action1.DATABASENAME,Action1.SCHEMANAME,Action1.OBJECTNAME

Detection

Execution Mode

Intelligent

Log Sources

SQL Server