DSRM Account Abuse

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query detects an abuse of the DSRM account in order to maintain persistence and access to the organization's Active Directory. Ref: https://adsecurity.org/?p=1785

Attribute Value
Type Analytic Rule
Solution Standalone Content
ID 979c42dd-533e-4ede-b18b-31a84ba8b3d6
Severity High
Kind Scheduled
Tactics Persistence
Techniques T1098
Required Connectors SecurityEvents
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
Event EventID == "13"
EventLog == "Microsoft-Windows-Sysmon/Operational"
?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules