MSSQL Server Failed Logon

Detects failed logon attempts from clients to MSSQL server.

Sigma rule (View on GitHub)

 1title: MSSQL Server Failed Logon
 2id: 218d2855-2bba-4f61-9c85-81d0ea63ac71
 3related:
 4    - id: ebfe73c2-5bc9-4ed9-aaa8-8b54b2b4777d
 5      type: similar
 6status: experimental
 7description: Detects failed logon attempts from clients to MSSQL server.
 8references:
 9    - https://cybersecthreat.com/2020/07/08/enable-mssql-authentication-log-to-eventlog/
10    - https://www.experts-exchange.com/questions/27800944/EventID-18456-Failed-to-open-the-explicitly-specified-database.html
11author: Nasreddine Bencherchali (Nextron Systems), j4son
12date: 2023-10-11
13modified: 2024-06-26
14tags:
15    - attack.credential-access
16    - attack.t1110
17logsource:
18    product: windows
19    service: application
20    definition: 'Requirements: Must enable MSSQL authentication.'
21detection:
22    selection:
23        Provider_Name|contains: 'MSSQL' # Note: We use contains to account for other third party providers - See https://github.com/SigmaHQ/sigma/issues/4876
24        EventID: 18456
25    condition: selection
26falsepositives:
27    - This event could stem from users changing an account's password that's used to authenticate via a job or an automated process. Investigate the source of such events and mitigate them
28level: low

References

Related rules

to-top