Link Search Menu Expand Document

AD_Audit_Policy_Change

ID: 100332

Description:

EventID 4719: System audit policy was changed

Repository: Group: WinlogBeat Type: event

Default Status:

Enabled

Tags:    
ActiveDirectory AD Active Directory
     

Selector:

Query:

Filters:

Field MUST hit
@eventType winlogbeat
winlog.event_id 4719
Field MUST NOT hit
   

Behavior Rule:

Key Type Behavior Category
winlog.computer_name asset application activity

Risks:

Risks Base Score Dimension
     

Attributes:

Alias Key
Hostname winlog.computer_name
Category winlog.task
Subcategory winlog.event_data.Subcategory
TaskCategory winlog.event_data.TaskCategory
AuditPolicyChanges winlog.event_data.AuditPolicyChanges
SubjectFullName winlog.SubjectFullName
Message @message

Correlation Rules:

First Occurrence:

Name Window Fields
NewUser 10 days winlog.event_data.SubjectUserName
  Risks: ML_NEW_USER
NewTaskCategory 10 days winlog.event_data.TaskCategory
  Risks: ML_NEW_SERVICE
NewCategory 10 days winlog.task
  Risks: ML_NEW_APP
NewSubcategory 10 days winlog.event_data.Subcategory
  Risks: ML_NEW_APP

Aggregation:

Name Window Field AggType Match
MultipleAlerts 1 hour   count gt 150
  Risks: BANDWIDTH_ANOMALY    

History:

| User | Date | | :— | :— | | — | — |

This page was automatically created/formatted on Tue, 2021 Oct 19 00:29:17 EDT, from rule_dump.json (db47c470500ce8686ead334f5eda0596)