AD FS Abnormal EKU object identifier attribute

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


'This detection uses Security events from the "AD FS Auditing" provider to detect suspicious object identifiers (OIDs) as part EventID 501 and specifically part of the Enhanced Key Usage attributes. This query checks to see if you have any new OIDs in the last hour that have not been seen in the previous day. New OIDs should be validated and OIDs that are very long, as indicated by the OID_Length field, could also be an indicator of malicious activity. In order to use this query you need to enab

Attribute Value
Type Analytic Rule
Solution Standalone Content
ID cfc1ae62-db63-4a3e-b88b-dc04030c2257
Severity High
Kind Scheduled
Tactics CredentialAccess
Techniques T1552
Required Connectors SecurityEvents
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
SecurityEvent EventID == "501" ?

Associated Connectors

The following connectors provide data for this content item:

Connector Solution
WindowsSecurityEvents Windows Security Events

Solutions: Windows Security Events


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules