Active Directory Replication from Non Machine Account

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects potential abuse of Active Directory Replication Service (ADRS) from a non machine account to request credentials.

Severity

Critical

Rule Requirement

Criteria

Action1: actionname = "Operation Performed on Object" AND (ACCESSMASK = "0x100" AND PROPERTIES contains "1131f6aa-9c07-11d1-f79f-00c04fc2dcd2,1131f6ad-9c07-11d1-f79f-00c04fc2dcd2,89e95b76-444d-4c62-991a-0facbeda640c") AND USERNAME notendswith "$,SOL_*" select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.DOMAIN,Action1.ACCESSES,Action1.OBJECTNAME,Action1.OBJECTTYPE

Detection

Execution Mode

realtime

Log Sources

Active Directory

Author

Roberto Rodriguez @Cyb3rWard0g