AD_ProcessCreation
ID: 100020
Description:
EventID 1: Process creation
An aggregation rule to track EventID:1 events Windows AD (Active Directory).
This rule will trigger when the number of events per ten (10) minutes exceeds 1000. This indicates that a machine may have some abnormal activity.
Repository: Fluency Group: AD Type: event
Default Status:
Enabled
| Tags: |
|---|
| AD |
Selector:
Query:
Filters:
| Field | MUST hit |
|---|---|
| @fields.EventID | 1 |
| @eventType | nxlogAD |
| Field | MUST NOT hit |
|---|---|
Behavior Rule:
| Key | Type | Behavior Category |
|---|---|---|
| @fields.Hostname | asset | security alert |
Risks:
| Risks | Base Score | Dimension |
|---|---|---|
Attributes:
| Alias | Key |
|---|---|
| Hostname | @fields.Hostname |
| EventID | @fields.EventID |
| EventType | @fields.EventType |
| CallerProcess | @fields.CallerProcessName |
| Username | @fields.SubjectUserName |
| SubjectDomain | @fields.SubjectDomainName |
| Category | @fields.Category |
Correlation Rules:
Aggregation:
| Name | Window | Field | AggType | Match |
|---|---|---|---|---|
| EventSpike | 10 minutes | @fields.Hostname | count | gt 1000 |
| Risks: | ALERT_NORMAL |
History:
| User | Date |
|---|---|
| ho*d@fluencysecurity.com | 2021 Oct 4 16:42:20 EDT |
This page was automatically created/formatted on Wed, 2022 May 4 21:43:53 EDT, from rule_dump.json (4d88bffdfb1cea26b3985f2193033606)