Detectionlowstable
A Member Was Added to a Security-Enabled Global Group
Detects activity when a member is added to a security-enabled global group
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Windowssecurity
ProductWindows← raw: windows
Servicesecurity← raw: security
Detection Logic
Detection Logic1 selector
detection:
selection:
EventID:
- 4728 # A member was added to a security-enabled global group
- 632 # Security Enabled Global Group Member Added
condition: selectionFalse Positives
Unknown
False positive likelihood has not been assessed. Additional context may be needed during triage.
MITRE ATT&CK
Related Rules
Similar
Rule not found9cf01b6c-e723-4841-a868-6d7f8245ca6e
Rule Metadata
Rule ID
c43c26be-2e87-46c7-8661-284588c5a53e
Status
stable
Level
low
Type
Detection
Created
Wed Apr 26
Author
Path
rules/windows/builtin/security/account_management/win_security_member_added_security_enabled_global_group.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.t1098