Service Principal Name (SPN) Assigned to User Account

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query identifies whether an Active Directory user object was assigned a service principal name which could indicate that an adversary is preparing for performing Kerberoasting. This query checks for event id 5136, that the Object Class field is "user" and the LDAP Display Name is "servicePrincipalName". Ref: https://thevivi.net/assets/docs/2019/theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf

Attribute Value
Type Analytic Rule
Solution Standalone Content
ID 875d0eb1-883a-4191-bd0e-dbfdeb95a464
Severity Medium
Kind Scheduled
Tactics PrivilegeEscalation
Techniques T1134
Required Connectors SecurityEvents
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
SecurityEvent EventID == "5136" ?

Associated Connectors

The following connectors provide data for this content item:

Connector Solution
WindowsSecurityEvents Windows Security Events

Solutions: Windows Security Events


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules