Local User Creation

Detects local user creation on Windows servers, which shouldn't happen in an Active Directory environment. Apply this Sigma Use Case on your Windows server logs and not on your DC logs.

Sigma rule (View on GitHub)

 1title: Local User Creation
 2id: 66b6be3d-55d0-4f47-9855-d69df21740ea
 3status: test
 4description: |
 5        Detects local user creation on Windows servers, which shouldn't happen in an Active Directory environment. Apply this Sigma Use Case on your Windows server logs and not on your DC logs.
 6references:
 7    - https://patrick-bareiss.com/detecting-local-user-creation-in-ad-with-sigma/
 8author: Patrick Bareiss
 9date: 2019/04/18
10modified: 2021/01/17
11tags:
12    - attack.persistence
13    - attack.t1136.001
14logsource:
15    product: windows
16    service: security
17detection:
18    selection:
19        EventID: 4720
20    condition: selection
21falsepositives:
22    - Domain Controller Logs
23    - Local accounts managed by privileged account management tools
24level: low

References

Related rules

to-top