AD_Audit_Policy_Change
ID: 100332
Description:
EventID 4719: System audit policy was changed
Repository: Group: WinlogBeat Type: event
Default Status:
Enabled
| Tags: | ||
|---|---|---|
| ActiveDirectory | AD | Active Directory |
Selector:
Query:
Filters:
| Field | MUST hit |
|---|---|
| @eventType | winlogbeat |
| winlog.event_id | 4719 |
| Field | MUST NOT hit |
|---|---|
Behavior Rule:
| Key | Type | Behavior Category |
|---|---|---|
| winlog.computer_name | asset | application activity |
Risks:
| Risks | Base Score | Dimension |
|---|---|---|
Attributes:
| Alias | Key |
|---|---|
| Hostname | winlog.computer_name |
| Category | winlog.task |
| Subcategory | winlog.event_data.Subcategory |
| TaskCategory | winlog.event_data.TaskCategory |
| AuditPolicyChanges | winlog.event_data.AuditPolicyChanges |
| SubjectFullName | winlog.SubjectFullName |
| Message | @message |
Correlation Rules:
First Occurrence:
| Name | Window | Fields |
|---|---|---|
| NewUser | 10 days | winlog.event_data.SubjectUserName |
| Risks: | ML_NEW_USER | |
| NewTaskCategory | 10 days | winlog.event_data.TaskCategory |
| Risks: | ML_NEW_SERVICE | |
| NewCategory | 10 days | winlog.task |
| Risks: | ML_NEW_APP | |
| NewSubcategory | 10 days | winlog.event_data.Subcategory |
| Risks: | ML_NEW_APP |
Aggregation:
| Name | Window | Field | AggType | Match |
|---|---|---|---|---|
| MultipleAlerts | 1 hour | count | gt 150 | |
| Risks: | BANDWIDTH_ANOMALY |
History:
| User | Date | | :— | :— | | — | — |
This page was automatically created/formatted on Wed, 2022 May 4 21:43:53 EDT, from rule_dump.json (4d88bffdfb1cea26b3985f2193033606)