Detectionlowtest
Local User Creation
Detects local user creation on Windows servers, which shouldn't happen in an Active Directory environment. Apply this Sigma Use Case on your Windows server logs and not on your DC logs.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Windowssecurity
ProductWindows← raw: windows
Servicesecurity← raw: security
Detection Logic
Detection Logic1 selector
detection:
selection:
EventID: 4720
condition: selectionFalse Positives
Domain Controller Logs
Local accounts managed by privileged account management tools
References
MITRE ATT&CK
Tactics
Sub-techniques
Rule Metadata
Rule ID
66b6be3d-55d0-4f47-9855-d69df21740ea
Status
test
Level
low
Type
Detection
Created
Thu Apr 18
Modified
Sun Jan 17
Author
Path
rules/windows/builtin/security/win_security_user_creation.yml
Raw Tags
attack.persistenceattack.t1136.001