AD_Audit_Policy_Change
ID: 100332
Description:
EventID 4719: System audit policy was changed
Repository: Group: WinlogBeat Type: event
Default Status:
Enabled
Tags: | ||
---|---|---|
ActiveDirectory | AD | Active Directory |
Selector:
Query:
Filters:
Field | MUST hit |
---|---|
@eventType | winlogbeat |
winlog.event_id | 4719 |
Field | MUST NOT hit |
---|---|
Behavior Rule:
Key | Type | Behavior Category |
---|---|---|
winlog.computer_name | asset | application activity |
Risks:
Risks | Base Score | Dimension |
---|---|---|
Attributes:
Alias | Key |
---|---|
Hostname | winlog.computer_name |
Category | winlog.task |
Subcategory | winlog.event_data.Subcategory |
TaskCategory | winlog.event_data.TaskCategory |
AuditPolicyChanges | winlog.event_data.AuditPolicyChanges |
SubjectFullName | winlog.SubjectFullName |
Message | @message |
Correlation Rules:
First Occurrence:
Name | Window | Fields |
---|---|---|
NewUser | 10 days | winlog.event_data.SubjectUserName |
Risks: | ML_NEW_USER | |
NewTaskCategory | 10 days | winlog.event_data.TaskCategory |
Risks: | ML_NEW_SERVICE | |
NewCategory | 10 days | winlog.task |
Risks: | ML_NEW_APP | |
NewSubcategory | 10 days | winlog.event_data.Subcategory |
Risks: | ML_NEW_APP |
Aggregation:
Name | Window | Field | AggType | Match |
---|---|---|---|---|
MultipleAlerts | 1 hour | count | gt 150 | |
Risks: | BANDWIDTH_ANOMALY |
History:
| User | Date | | :— | :— | | — | — |
This page was automatically created/formatted on Wed, 2022 May 4 21:43:53 EDT, from rule_dump.json (4d88bffdfb1cea26b3985f2193033606)