Files
sigma-rules/docs/audit_policies/windows/audit_sensitive_privilege_use.md
T
Jonhnathan a2bf7f088d [Security Content] Windows Setup Guides - WinEventLog & Sysmon (#5162)
* [Security Content] Windows Setup Guides

* Move it to the right folder

* Fix link

* test

* ++

* ++

* ++

* ++

* ++

* ++

* ++

* ++

* Fix links

* ++

* ++

* Update pyproject.toml

* Update docs/audit_policies/windows/sysmon_eventid1_process_creation.md

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Update docs/audit_policies/windows/audit_powershell_scriptblock.md

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Update pyproject.toml

---------

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2025-11-14 09:22:31 -08:00

1.9 KiB

Audit Sensitive Privilege Use

Setup

Some detection rules require monitoring the use of sensitive privileges to detect privilege escalation attempts or unauthorized actions. Enabling this setting provides visibility into when sensitive privileges are used, helping to strengthen security and compliance.

Caution: Enabling this audit policy can generate a high volume of events. Evaluate the audit policy in a group of servers to measure volume and filter unwanted events before deploying in the entire domain.

Enable Audit Policy via Group Policy

To enable Audit Sensitive Privilege Use across a group of servers using Active Directory Group Policies, administrators must enable the Audit Sensitive Privilege Use policy. Follow these steps to configure the audit policy via Advanced Audit Policy Configuration:

Computer Configuration > 
Policies > 
Windows Settings > 
Security Settings > 
Advanced Audit Policies Configuration > 
Audit Policies > 
Privilege Use > 
Audit Sensitive Privilege Use (Success)

Enable Locally using auditpol

To enable this policy on a local machine, run the following command in an elevated command prompt:

auditpol.exe /set /subcategory:"Sensitive Privilege Use" /success:enable /failure:enable

Event IDs

When this audit policy is enabled, the following event IDs may be generated:

  • 4673: A privileged service was called.
  • 4674: An operation was attempted on a privileged object.
  • 4985: The state of a transaction has changed.

Use the following GitHub search to identify rules that use the events listed:

Elastic Detection Rules Github Repo Search