AD_UserCreated_Used
ID: 100074
Description:
A series of events with several EventID’s, indicating a user account was created, enabled and then used (logged in).
EventID 4720: A user account was created EventID 4722: A user account was enabled EventID 4624: An account was successfully logged on
Repository: Fluency Group: AD Type: event
Default Status:
Enabled
| Tags: | |
|---|---|
| Logon | Events |
Selector:
Query:
@fields.EventID:4720 OR @fields.EventID:4722 OR @fields.EventID:4624
Filters:
| Field | MUST hit |
|---|---|
| Field | MUST NOT hit |
|---|---|
Behavior Rule:
| Key | Type | Behavior Category |
|---|---|---|
| @fields.TargetUserName | AD.AgentID | account login |
Risks:
| Risks | Base Score | Dimension |
|---|---|---|
Attributes:
| Alias | Key |
|---|---|
| EventID | @fields.EventID |
| TargetUserName | @fields.TargetUserName |
| Hostname | @fields.Hostname |
| TargetDomainName | @fields.TargetDomainName |
| Customer | @customer |
Correlation Rules:
Aggregation:
| Name | Window | Field | AggType | Match |
|---|---|---|---|---|
| UserCreatedAndUsed | 1 hour | @fields.EventID | cardinality | gt 2 |
| Risks: | ALERT_POLICY |
History:
| User | Date |
|---|---|
| em*n@fluencysecurity.com | 2021 Feb 24 14:11:00 EST |
| ho*d@fluencysecurity.com | 2021 Sep 30 10:53:09 EDT |
This page was automatically created/formatted on Wed, 2022 May 4 21:43:53 EDT, from rule_dump.json (4d88bffdfb1cea26b3985f2193033606)