AD_Failed_Login_On_Locked_Account
ID: 100341
Description:
A user’s logon attempt failed on an account that was subsequently locked or was already locked out
Repository: Group: WinlogBeat Type: event
Default Status:
Enabled
Tags: |
---|
AD |
Selector:
Query:
Filters:
Field | MUST hit |
---|---|
winlog.event_id | 4625 |
winlog.event_data.Status | 0xc0000234 |
0xC0000224 | |
winlog.event_data.TargetUserName | exist (boolean) |
Field | MUST NOT hit |
---|---|
Behavior Rule:
Key | Type | Behavior Category |
---|---|---|
winlog.event_data.TargetUserName | username | account login |
Risks:
Risks | Base Score | Dimension |
---|---|---|
ALERT_NORMAL | 100 | alert |
Attributes:
Alias | Key |
---|---|
TargetUserName | winlog.event_data.TargetUserName |
TargetDomainName | winlog.event_data.TargetDomainName |
SubjectUserSid | winlog.event_data.SubjectUserSid |
SubjectUserName | winlog.event_data.SubjectUserName |
SubjectDomainName | winlog.event_data.SubjectDomainName |
SubjectLogonId | winlog.event_data.SubjectLogonId |
LogonType | winlog.event_data.LogonType |
WorkstationName | source.domain |
IpAddress | winlog.event_data.IpAddress |
Correlation Rules:
First Occurrence:
Name | Window | Fields |
---|---|---|
NewUser | 10 days | winlog.event_data.TargetUserName |
Risks: | ML_NEW_USER |
Aggregation:
Name | Window | Field | AggType | Match |
---|---|---|---|---|
MultipleFails | 1 hour | count | gt 10 | |
Risks: | ALERT_POLICY |
History:
| User | Date | | :— | :— | | — | — |
This page was automatically created/formatted on Wed, 2022 May 4 21:43:53 EDT, from rule_dump.json (4d88bffdfb1cea26b3985f2193033606)