Detectionmediumexperimental
FortiGate - New Administrator Account Created
Detects the creation of an administrator account on a Fortinet FortiGate Firewall.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
fortigateevent
Productfortigate← raw: fortigate
Serviceevent← raw: event
Detection Logic
Detection Logic1 selector
detection:
selection:
action: 'Add'
cfgpath: 'system.admin'
condition: selectionFalse Positives
An administrator account can be created for legitimate purposes. Investigate the account details to determine if it is authorized.
MITRE ATT&CK
Tactics
Sub-techniques
Rule Metadata
Rule ID
cd0a4943-0edd-42cf-b50c-06f77a10d4c1
Status
experimental
Level
medium
Type
Detection
Created
Sat Nov 01
Path
rules/network/fortinet/fortigate/fortinet_fortigate_new_admin_account_created.yml
Raw Tags
attack.persistenceattack.t1136.001