Skip to content

Commit eae9147

Browse files
committed
remove dynamic risk score
1 parent db69bf0 commit eae9147

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

detections/endpoint/windows_ad_privileged_object_access_activity.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,9 @@ search: '`wineventlog_security` EventCode=4662 ObjectName IN (
3333
"CN=Organization Management,*")
3434
| rex field=ObjectName "CN\=(?<object_name>[^,]+)"
3535
| stats values(Computer) as dest, values(object_name) as object_name, dc(ObjectName) as object_count, min(_time) as firstTime, max(_time) as lastTime, count by SubjectUserName
36+
| rename SubjectUserName as user
3637
| `security_content_ctime(firstTime)`
3738
| `security_content_ctime(lastTime)`
38-
| eval user = SubjectUserName, risk_score = case(object_count=1,40,object_count>1,object_count*30,true(),40)
3939
| `windows_ad_privileged_object_access_activity_filter`'
4040
how_to_implement: Enable Audit Directory Service Access via GPO and collect event code 4662. The required SACLs need to be created for the relevant objects. Be aware Splunk filters this event by default on the Windows TA.
4141
known_false_positives: Service accounts or applications that routinely query Active Directory for information.

0 commit comments

Comments
 (0)