From 2e32e1bb437a31346fb35e8a78f79faf4c4db3d2 Mon Sep 17 00:00:00 2001 From: Florian Roth Date: Tue, 14 Mar 2017 12:51:50 +0100 Subject: [PATCH] Rule: User account added to local Administrators --- .../win_user_added_to_local_administrators.yml | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 rules/windows/builtin/win_user_added_to_local_administrators.yml diff --git a/rules/windows/builtin/win_user_added_to_local_administrators.yml b/rules/windows/builtin/win_user_added_to_local_administrators.yml new file mode 100644 index 000000000..667b1a30c --- /dev/null +++ b/rules/windows/builtin/win_user_added_to_local_administrators.yml @@ -0,0 +1,17 @@ +title: User Added to Local Administrators +description: This rule triggers on user accounts that are added to the local Administrators group, which could be legitimate activity or a sign of privilege escalation activity +status: stable +author: Florian Roth +logsource: + product: windows + service: system +detection: + selection: + EventID: 4732 + GroupName: Administrators + filter: + SubjectAccountName: '*$' + condition: selection and not filter +falsepositives: + - Legitimate administrative activity +level: low