AD_LocalGroupEnumerated
ID: 100019
Description:
EventID 4799: A security-enabled local group membership was enumerated
An aggregation rule to track EventID:4799 events Windows AD (Active Directory).
This rule will trigger when the number of events per twenty (20) minutes exceeds 100. This indicates that a machine may have some abnormal activity.
Repository: Fluency Group: AD Type: event
Default Status:
Enabled
| Tags: | 
|---|
| AD | 
Selector:
Query:
Filters:
| Field | MUST hit | 
|---|---|
| @fields.EventID | 4799 | 
| @eventType | nxlogAD | 
| Field | MUST NOT hit | 
|---|---|
Behavior Rule:
| Key | Type | Behavior Category | 
|---|---|---|
| @fields.Hostname | asset | security alert | 
Risks:
| Risks | Base Score | Dimension | 
|---|---|---|
Attributes:
| Alias | Key | 
|---|---|
| Hostname | @fields.Hostname | 
| EventID | @fields.EventID | 
| EventType | @fields.EventType | 
| CallerProcess | @fields.CallerProcessName | 
| Username | @fields.SubjectUserName | 
| SubjectDomain | @fields.SubjectDomainName | 
| Category | @fields.Category | 
Correlation Rules:
Aggregation:
| Name | Window | Field | AggType | Match | 
|---|---|---|---|---|
| EventSpike | 20 minutes | @fields.Hostname | count | gt 100 | 
| Risks: | ALERT_NORMAL | 
History:
| User | Date | 
|---|---|
| ho*d@fluencysecurity.com | 2021 Oct 4 16:44:57 EDT | 
This page was automatically created/formatted on Wed, 2022 May 4 21:43:53 EDT, from rule_dump.json (4d88bffdfb1cea26b3985f2193033606)