Alsid
Overview
Alsid is an automated security solution that monitors the components of Active Directory infrastructures by detecting attacks in real time, identifying existing weaknesses and vulnerabilities.
- Vendor: Alsid
- Supported environment: On prem
- Detection based on: Alert, Telemetry
- Supported application or feature:Application logs, Authentication logs, Network protocol analysis
Configure
As of now, the main solution to collect Alsid logs leverages the Rsyslog recipe. Please share your experiences with other recipes by editing this documentation.
Rsyslog
Please refer to the documentation of Alsid to forward events to your rsyslog server. The reader is also invited to consult the Rsyslog Transport documentation to forward these logs to Sekoia.io.
Detection section
The following section provides information for those who wish to learn more about the detection capabilities enabled by collecting this intake. It includes details about the built-in rule catalog, event categories, and ECS fields extracted from raw events. This is essential for users aiming to create custom detection rules, perform hunting activities, or pivot in the events page.
Related Built-in Rules
The following Sekoia.io built-in rules match the intake Tenable Identity Exposure / Alsid. This documentation is updated automatically and is based solely on the fields used by the intake which are checked against our rules. This means that some rules will be listed but might not be relevant with the intake.
SEKOIA.IO x Tenable Identity Exposure / Alsid on ATT&CK Navigator
RSA SecurID Failed Authentification
Detects many failed attempts to authenticate followed by a successfull login for a super admin account.
- Effort: advanced
Tenable Identity Exposure / Alsid Critical Severity Alert
Tenable Identity Exposure / Alsid raised a critical severity alert.
- Effort: master
Tenable Identity Exposure / Alsid High Severity Alert
Tenable Identity Exposure / Alsid raised an alert.
- Effort: master
Event Categories
The following table lists the data source offered by this integration.
Data Source | Description |
---|---|
Application logs |
Alsid events bring information from Active Directory logs |
Authentication logs |
Alsid alerts provide details on anomalies/threats detected in authentication logs |
Network protocol analysis |
information on LDAP, DNS and Kerberos protocols are collected through Alsid logs |
In details, the following table denotes the type of events produced by this integration.
Name | Values |
---|---|
Kind | alert , trailflow |
Category | `` |
Type | `` |
Transformed Events Samples after Ingestion
This section demonstrates how the raw logs will be transformed by our parsers. It shows the extracted fields that will be available for use in the built-in detection rules and hunting activities in the events page. Understanding these transformations is essential for analysts to create effective detection mechanisms with custom detection rules and to leverage the full potential of the collected data.
{
"message": "\"0\" \"1\" \"ad.corp\" \"ad.corp\" \"C-PKI-DANG-ACCESS\" \"critical\" \"CN=DSCUCNExport,CN=Certificate \nTemplates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=corp\" \"1996840\" \"2\" \n\"R-CERTIF-TEMPLATE-MISCONFIG\" \"76485473\" \"DisplayName\"=\"DSC UCN Export\" \"DomainName\"=\"ad.corp\" \n\"DangerousAceList\"=\"[{\"Item1\":\"OA;;CR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1229472208-2678311744-2345022811-34\n5849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.corp\\\\AC750-DSI-SDAT-Espace de \ntravail-FOO-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended \nright\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"OA;;RPWPCR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-109881018\n9-8133351-2328693739-515\",\"Item2\":\"S-1-5-21-1098810189-8133351-2328693739-515\",\"Item3\":\"ad.corp\\\\Ordinateurs du \ndomaine\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended \nright\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\"\n,\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.corp\\\\AC750-DSI-SDAT-Espace de \ntravail-FOO-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Write all properties\",\"Item2\":\"\"}]}]\" \n\"TrustEnrollServiceAceOptionChecked\"=\"\u2610\" \"TrustEnrollServicesList\"=\"\u29b0\" \"ApproveCertifTestOptionChecked\"=\"\u2610\" \n\"EnrollmentFlagDeviantAces\"=\"?\" \"EnrollmentFlagAttributeMisconfigured\"=\"?\" \"RaSignatureAttributeDeviantAces\"=\"\u274c\ufe0f\" \n\"RaSignatureAttributeMisconfigured\"=\"\u274c\ufe0f\" \"EkuAttributeDeviantAces\"=\"\u274c\ufe0f\" \"EkuContainAuthAttribute\"=\"\u2714\ufe0f\" \n\"EkuContainAuthList\"=\"\u29b0\" \"SanConfigCsrOptionChecked\"=\"\u2612\" \"CertificateNameDeviantAces\"=\"\u274c\ufe0f\" \n\"SanConfigCsrMisconfigured\"=\"\u2714\ufe0f\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-PKI-DANG-ACCESS",
"outcome": "success",
"outcome_reason": "R-CERTIF-TEMPLATE-MISCONFIG",
"properties": {
"ADdevianceID": 1996840,
"ADdomainName": "ad.corp",
"ADforestName": "ad.corp",
"ADobject": "CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=corp",
"ApproveCertifTestOptionChecked": "\u2610",
"CertificateNameDeviantAces": "\u274c\ufe0f",
"DangerousAceList": "{\"Item1\":\"OA;;CR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.corp\\\\AC750-DSI-SDAT-Espace de travail-FOO-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended right\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"OA;;RPWPCR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1098810189-8133351-2328693739-515\",\"Item2\":\"S-1-5-21-1098810189-8133351-2328693739-515\",\"Item3\":\"ad.corp\\\\Ordinateurs du domaine\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended right\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.corp\\\\AC750-DSI-SDAT-Espace de travail-FOO-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Write all properties\",\"Item2\":\"\"}]}",
"DisplayName": "DSC UCN Export",
"DomainName": "ad.corp",
"EkuAttributeDeviantAces": "\u274c\ufe0f",
"EkuContainAuthAttribute": "\u2714\ufe0f",
"EkuContainAuthList": "\u29b0",
"EnrollmentFlagAttributeMisconfigured": "?",
"EnrollmentFlagDeviantAces": "?",
"RaSignatureAttributeDeviantAces": "\u274c\ufe0f",
"RaSignatureAttributeMisconfigured": "\u274c\ufe0f",
"SanConfigCsrMisconfigured": "\u2714\ufe0f",
"SanConfigCsrOptionChecked": "\u2612",
"TrustEnrollServiceAceOptionChecked": "\u2610",
"TrustEnrollServicesList": "\u29b0",
"alertID": 1,
"alertSeverityLevel": "critical",
"eventID": "76485473"
},
"type": "alert"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"0\" \"1\" \"ad.domain\" \"ad.domain\" \"C-PKI-DANG-ACCESS\" \"critical\" \"CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain\" \"1996839\" \"2\" \"R-CERTIF-TEMPLATE-ACL\" \"76485473\" \n \"DistinguishedName\"=\"CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain\" \n \"DangerousAceList\"=\"[{\"Item1\":\"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.domain\\\\AC750-DSI-FOO-Espace de \n travail-GSW-Adm\",\"Item4\":[{\"Item1\":\"Modify permissions\",\"Item2\":\"\"},{\"Item1\":\"Modify owner\",\"Item2\":\"\"},{\"Item1\":\"Write all properties\",\"Item2\":\"\"}]}]\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-PKI-DANG-ACCESS",
"outcome": "success",
"outcome_reason": "R-CERTIF-TEMPLATE-ACL",
"properties": {
"ADdevianceID": 1996839,
"ADdomainName": "ad.domain",
"ADforestName": "ad.domain",
"ADobject": "CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain",
"DangerousAceList": "{\"Item1\": \"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\", \"Item2\": \"S-1-5-21-1229472208-2678311744-2345022811-345849\", \"Item3\": \"urdom.ad.domain\\\\AC750-DSI-FOO-Espace de travail-GSW-Adm\", \"Item4\": [{\"Item1\": \"Modify permissions\", \"Item2\": \"\"}, {\"Item1\": \"Modify owner\", \"Item2\": \"\"}, {\"Item1\": \"Write all properties\", \"Item2\": \"\"}]}",
"DistinguishedName": "CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain",
"alertID": 1,
"alertSeverityLevel": "critical",
"eventID": "76485473"
},
"type": "alert"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"0\" \"1\" \"ad.domain\" \"ad.domain\" \"C-PKI-DANG-ACCESS\" \"critical\" \"CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain\" \"1996840\" \"2\" \n\"R-CERTIF-TEMPLATE-MISCONFIG\" \"76485473\" \"DisplayName\"=\"DSC UCN Export\" \"DomainName\"=\"ad.domain\" \n\"DangerousAceList\"=\"[{\"Item1\":\"OA;;CR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item\n3\":\"urdom.ad.domain\\\\AC750-DSI-SDAT-Espace de travail-GSW-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended \nright\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"OA;;RPWPCR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1098810189-8133351-2328693739-515\",\"Item2\":\"S-1-5-21-1098810189-8133351-2328693\n739-515\",\"Item3\":\"ad.domain\\\\Ordinateurs du domaine\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended \nright\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"u\nrdom.ad.domain\\\\AC750-DSI-SDAT-Espace de travail-GSW-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Write all properties\",\"Item2\":\"\"}]}]\" \"TrustEnrollServiceAceOptionChecked\"=\"\u2610\" \n\"TrustEnrollServicesList\"=\"\u29b0\" \"ApproveCertifTestOptionChecked\"=\"\u2610\" \"EnrollmentFlagDeviantAces\"=\"?\" \"EnrollmentFlagAttributeMisconfigured\"=\"?\" \"RaSignatureAttributeDeviantAces\"=\"\u274c\ufe0f\" \n\"RaSignatureAttributeMisconfigured\"=\"\u274c\ufe0f\" \"EkuAttributeDeviantAces\"=\"\u274c\ufe0f\" \"EkuContainAuthAttribute\"=\"\u2714\ufe0f\" \"EkuContainAuthList\"=\"\u29b0\" \"SanConfigCsrOptionChecked\"=\"\u2612\" \n\"CertificateNameDeviantAces\"=\"\u274c\ufe0f\" \"SanConfigCsrMisconfigured\"=\"\u2714\ufe0f\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-PKI-DANG-ACCESS",
"outcome": "success",
"outcome_reason": "R-CERTIF-TEMPLATE-MISCONFIG",
"properties": {
"ADdevianceID": 1996840,
"ADdomainName": "ad.domain",
"ADforestName": "ad.domain",
"ADobject": "CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain",
"ApproveCertifTestOptionChecked": "\u2610",
"CertificateNameDeviantAces": "\u274c\ufe0f",
"DangerousAceList": "{\"Item1\":\"OA;;CR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.domain\\\\AC750-DSI-SDAT-Espace de travail-GSW-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended right\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"OA;;RPWPCR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1098810189-8133351-2328693739-515\",\"Item2\":\"S-1-5-21-1098810189-8133351-2328693739-515\",\"Item3\":\"ad.domain\\\\Ordinateurs du domaine\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended right\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.domain\\\\AC750-DSI-SDAT-Espace de travail-GSW-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Write all properties\",\"Item2\":\"\"}]}",
"DisplayName": "DSC UCN Export",
"DomainName": "ad.domain",
"EkuAttributeDeviantAces": "\u274c\ufe0f",
"EkuContainAuthAttribute": "\u2714\ufe0f",
"EkuContainAuthList": "\u29b0",
"EnrollmentFlagAttributeMisconfigured": "?",
"EnrollmentFlagDeviantAces": "?",
"RaSignatureAttributeDeviantAces": "\u274c\ufe0f",
"RaSignatureAttributeMisconfigured": "\u274c\ufe0f",
"SanConfigCsrMisconfigured": "\u2714\ufe0f",
"SanConfigCsrOptionChecked": "\u2612",
"TrustEnrollServiceAceOptionChecked": "\u2610",
"TrustEnrollServicesList": "\u29b0",
"alertID": 1,
"alertSeverityLevel": "critical",
"eventID": "76485473"
},
"type": "alert"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"0\" \"1\" \"ad.domain\" \"ad.domain\" \"C-PKI-DANG-ACCESS\" \"critical\" \"CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain\" \"1996839\" \"2\" \"R-CERTIF-TEMPLATE-ACL\" \n\"76485473\" \"DistinguishedName\"=\"CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain\" \n\"DangerousAceList\"=\"[{\"Item1\":\"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.domain\\\\AC750-DSI-SDAT-Espace de \ntravail-GSW-Adm\",\"Item4\":[{\"Item1\":\"Modify permissions\",\"Item2\":\"\"},{\"Item1\":\"Modify owner\",\"Item2\":\"\"},{\"Item1\":\"Write all properties\",\"Item2\":\"\"}]}]\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-PKI-DANG-ACCESS",
"outcome": "success",
"outcome_reason": "R-CERTIF-TEMPLATE-ACL",
"properties": {
"ADdevianceID": 1996839,
"ADdomainName": "ad.domain",
"ADforestName": "ad.domain",
"ADobject": "CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain",
"DangerousAceList": "{\"Item1\": \"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\", \"Item2\": \"S-1-5-21-1229472208-2678311744-2345022811-345849\", \"Item3\": \"urdom.ad.domain\\\\AC750-DSI-SDAT-Espace de travail-GSW-Adm\", \"Item4\": [{\"Item1\": \"Modify permissions\", \"Item2\": \"\"}, {\"Item1\": \"Modify owner\", \"Item2\": \"\"}, {\"Item1\": \"Write all properties\", \"Item2\": \"\"}]}",
"DistinguishedName": "CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain",
"alertID": 1,
"alertSeverityLevel": "critical",
"eventID": "76485473"
},
"type": "alert"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"0\" \"1\" \"ad.domain\" \"urdom.ad.domain\" \"C-GPO-EXEC-SANITY\" \"high\" \"CN={3D4A6260-9D6C-4062-B56B-DC6D419333CE},CN=Policies,CN=System,DC=urdom,DC=ad,DC=domain\" \"2008125\" \"2\" \n\"R-GPO-EXEC-SANITY-UNKNOWN-CSE\" \"79016668\" \"CseGuid\"=\"{8472c2c4-6b70-4301-a20d-a6cea5f82b7e}\" \"AttributeName\"=\"GpcMachineExtensionName\" \"GpoName\"=\"#URDOM-APP-RSAT-TEST\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-GPO-EXEC-SANITY",
"outcome": "success",
"outcome_reason": "R-GPO-EXEC-SANITY-UNKNOWN-CSE",
"properties": {
"ADdevianceID": 2008125,
"ADdomainName": "urdom.ad.domain",
"ADforestName": "ad.domain",
"ADobject": "CN={3D4A6260-9D6C-4062-B56B-DC6D419333CE},CN=Policies,CN=System,DC=urdom,DC=ad,DC=domain",
"AttributeName": "GpcMachineExtensionName",
"CseGuid": "{8472c2c4-6b70-4301-a20d-a6cea5f82b7e}",
"GpoName": "#URDOM-APP-RSAT-TEST",
"alertID": 1,
"alertSeverityLevel": "high",
"eventID": "79016668"
},
"type": "alert"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"0\" \"1\" \"ad.domain\" \"urdom.ad.domain\" \"C-OBSOLETE-SYSTEMS\" \"high\" \n \"CN=cnpsp16bd,OU=Sharepoint,OU=Production,OU=DataCenter,OU=Serveurs,OU=DataC \n ter,DC=urdom,DC=ad,DC=domain\" \"2007590\" \"2\" \"R-SLEEPING-OBSOLETE-SYSTEMS\" \n \"78964369\" \"ComputerCn\"=\"cnpsp16bd\" \"OperatingSystem\"=\"Windows Server 2012 R2 \n Standard\" \"OperatingSystemVersion\"=\"6.3 (9600)\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-OBSOLETE-SYSTEMS",
"outcome": "success",
"outcome_reason": "R-SLEEPING-OBSOLETE-SYSTEMS",
"properties": {
"ADdevianceID": 2007590,
"ADdomainName": "urdom.ad.domain",
"ADforestName": "ad.domain",
"ADobject": "CN=cnpsp16bd,OU=Sharepoint,OU=Production,OU=DataCenter,OU=Serveurs,OU=DataC ter,DC=urdom,DC=ad,DC=domain",
"ComputerCn": "cnpsp16bd",
"OperatingSystem": "Windows Server 2012 R2 Standard",
"OperatingSystemVersion": "6.3 (9600)",
"alertID": 1,
"alertSeverityLevel": "high",
"eventID": "78964369"
},
"type": "alert"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"2\" \"21\" \"foo.ad.com\" \"AD\" \"Suspicious DC Password Change\" \"critical\" \"Unknown\" \"Unknown\" \"HOSTNAME-040\" \"10.17.92.40\" \"user\"=\"ANONYMOUS LOGON\" \"source_hostname\"=\"Unknown\" \"source_ip\"=\"Unknown\" \"dc_name\"=\"HOSTNAME-040\" \"dc_ip\"=\"10.17.92.40\" \"targeted_dc_account\"=\"USERNAME-002$\" \"tool\"=\"foo-script\" \"password_renewal_duration\"=\"30:04:30:05\"",
"event": {
"kind": "alert"
},
"action": {
"properties": {
"ADdomainName": "AD",
"ADforestName": "foo.ad.com",
"ADobject": "Suspicious DC Password Change",
"alertID": 21,
"dc_ip": "10.17.92.40",
"dc_name": "HOSTNAME-040",
"eventID": "critical",
"eventType": "Unknown",
"field1": "Unknown",
"field2": "HOSTNAME-040",
"field3": "10.17.92.40",
"password_renewal_duration": "30:04:30:05",
"source_hostname": "Unknown",
"source_ip": "Unknown",
"targeted_dc_account": "USERNAME-002$",
"tool": "foo-script",
"user": "ANONYMOUS LOGON"
},
"type": "alert"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"0\" \"1\" \"Alsid Forest\" \"emea.corp\" \"C-ADMIN-RESTRICT-AUTH\" \"high\" \"OU=D528,OU=Desktops,OU=Computers,DC=emae,DC=corp\" \"1958016\" \"2\" \"R-PRIVUSER-CAN-LOGON\" \"49271575\" \"UserCn\"=\"John DOE (Admin T0)\" \"UserDomain\"=\"emea.corp\" \"PrivilegesPath\"=\"CN=Adminintrator,CN=Users,DC=emae,DC=corp\" \"ParentContainer\"=\"OU=D528,OU=Desktops,OU=Computers,DC=emae,DC=corp\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-ADMIN-RESTRICT-AUTH",
"outcome": "success",
"outcome_reason": "R-PRIVUSER-CAN-LOGON",
"properties": {
"ADdevianceID": 1958016,
"ADdomainName": "emea.corp",
"ADforestName": "Alsid Forest",
"ADobject": "OU=D528,OU=Desktops,OU=Computers,DC=emae,DC=corp",
"ParentContainer": "OU=D528,OU=Desktops,OU=Computers,DC=emae,DC=corp",
"PrivilegesPath": "CN=Adminintrator,CN=Users,DC=emae,DC=corp",
"alertID": 1,
"alertSeverityLevel": "high",
"eventID": "49271575"
},
"type": "alert"
},
"related": {
"user": [
"John DOE"
]
},
"service": {
"name": "active directory",
"type": "ldap"
},
"user": {
"domain": "emea.corp",
"name": "John DOE"
}
}
{
"message": "\"0\" \"1\" \"Alsid Forest\" \"emea.corp\" \"C-UNCONST-DELEG\" \"critical\" \"CN=Thrid Backup,OU=Technical,OU=Users,OU=Third,DC=emea,DC=corp\" \"1920595\" \"2\" \"R-DELEG-PRIVUSERS-NOT-PROTECTED\" \"50666797\" \"Cn\"=\"Thrid Backup\" \"PrivilegesPath\"=\"CN=Backup,CN=Builtin,DC=emea,DC=corp\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-UNCONST-DELEG",
"outcome": "success",
"outcome_reason": "R-DELEG-PRIVUSERS-NOT-PROTECTED",
"properties": {
"ADdevianceID": 1920595,
"ADdomainName": "emea.corp",
"ADforestName": "Alsid Forest",
"ADobject": "CN=Thrid Backup,OU=Technical,OU=Users,OU=Third,DC=emea,DC=corp",
"PrivilegesPath": "CN=Backup,CN=Builtin,DC=emea,DC=corp",
"alertID": 1,
"alertSeverityLevel": "critical",
"eventID": "50666797"
},
"type": "alert"
},
"related": {
"user": [
"Thrid Backup"
]
},
"service": {
"name": "active directory",
"type": "ldap"
},
"user": {
"name": "Thrid Backup"
}
}
{
"message": "\"0\" \"1\" \"Alsid Forest\" \"emea.corp\" \"C-NATIVE-ADM-GROUP-MEMBERS\" \"critical\" \"CN=Main Administrators,CN=Users,DC=emea,DC=corp\" \"1959337\" \"2\" \"R-NOT-IN-WHITELIST\" \"51204253\" \"AccountCn\"=\"John Doe (Admin Root)\" \"GroupCn\"=\"Main Administrators\" \"PrivilegesPath\"=\"CN=Main Administrators,CN=Users,DC=emea,DC=corp\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-NATIVE-ADM-GROUP-MEMBERS",
"outcome": "success",
"outcome_reason": "R-NOT-IN-WHITELIST",
"properties": {
"ADdevianceID": 1959337,
"ADdomainName": "emea.corp",
"ADforestName": "Alsid Forest",
"ADobject": "CN=Main Administrators,CN=Users,DC=emea,DC=corp",
"PrivilegesPath": "CN=Main Administrators,CN=Users,DC=emea,DC=corp",
"alertID": 1,
"alertSeverityLevel": "critical",
"eventID": "51204253"
},
"type": "alert"
},
"related": {
"user": [
"John Doe"
]
},
"service": {
"name": "active directory",
"type": "ldap"
},
"user": {
"group": {
"name": "Main Administrators"
},
"name": "John Doe"
}
}
{
"message": "\"0\" \"1\" \"Alsid Forest\" \"emea.corp\" \"C-ADMIN-RESTRICT-AUTH\" \"high\" \"OU=D528,OU=Desktops,OU=Computers,DC=emae,DC=corp\" \"1958033\" \"2\" \"R-PRIVUSER-CAN-LOGON-ACROSS-TRUST\" \"49271575\" \"UserCn\"=\"John Doe (Admin Root)\" \"UserDomain\"=\"emea.corp\" \"PrivilegesPath\"=\"CN=Main Administrators,CN=Users,DC=emea,DC=corp\" \"ParentContainer\"=\"OU=D528,OU=Desktops,OU=Computers,DC=emae,DC=corp\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-ADMIN-RESTRICT-AUTH",
"outcome": "success",
"outcome_reason": "R-PRIVUSER-CAN-LOGON-ACROSS-TRUST",
"properties": {
"ADdevianceID": 1958033,
"ADdomainName": "emea.corp",
"ADforestName": "Alsid Forest",
"ADobject": "OU=D528,OU=Desktops,OU=Computers,DC=emae,DC=corp",
"ParentContainer": "OU=D528,OU=Desktops,OU=Computers,DC=emae,DC=corp",
"PrivilegesPath": "CN=Main Administrators,CN=Users,DC=emea,DC=corp",
"alertID": 1,
"alertSeverityLevel": "high",
"eventID": "49271575"
},
"type": "alert"
},
"related": {
"user": [
"John Doe"
]
},
"service": {
"name": "active directory",
"type": "ldap"
},
"user": {
"domain": "emea.corp",
"name": "John Doe"
}
}
{
"message": "\"0\" \"1\" \"Alsid Forest\" \"emea.corp\" \"C-PASSWORD-DONT-EXPIRE\" \"medium\" \"CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=emea,DC=corp\" \"28\" \"1\" \"R-DONT-EXPIRE-SET\" \"2434\" \"TrusteeCn\"=\"GustavoFring\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-PASSWORD-DONT-EXPIRE",
"outcome": "success",
"outcome_reason": "R-DONT-EXPIRE-SET",
"properties": {
"ADdevianceID": 28,
"ADdomainName": "emea.corp",
"ADforestName": "Alsid Forest",
"ADobject": "CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=emea,DC=corp",
"TrusteeCn": "GustavoFring",
"alertID": 1,
"alertSeverityLevel": "medium",
"eventID": "2434"
},
"type": "alert"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"0\" \"1\" \"Corp Forest\" \"alsid.corp\" \"C-UNCONST-DELEG\" \"critical\" \"CN=ALSID-LAB-SERVE,OU=AlsidComputers,DC=alsid,DC=corp\" \"1\" \"1\" \"R-UNCONST-DELEG\" \"2\" \"AadConnectDbServer\"=\"127.0.0.1\" \"Action\"=\"Write-Property\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-UNCONST-DELEG",
"outcome": "success",
"outcome_reason": "R-UNCONST-DELEG",
"properties": {
"ADdevianceID": 1,
"ADdomainName": "alsid.corp",
"ADforestName": "Corp Forest",
"ADobject": "CN=ALSID-LAB-SERVE,OU=AlsidComputers,DC=alsid,DC=corp",
"AadConnectDbServer": "127.0.0.1",
"Action": "Write-Property",
"alertID": 1,
"alertSeverityLevel": "critical",
"eventID": "2"
},
"type": "alert"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"0\" \"1\" \"Alsid Forest\" \"emea.corp\" \"C-PASSWORD-DONT-EXPIRE\" \"medium\" \"CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=emea,DC=corp\" \"28\" \"1\" \"R-DONT-EXPIRE-SET\" \"2434\"",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-PASSWORD-DONT-EXPIRE",
"outcome": "success",
"outcome_reason": "R-DONT-EXPIRE-SET",
"properties": {
"ADdevianceID": 28,
"ADdomainName": "emea.corp",
"ADforestName": "Alsid Forest",
"ADobject": "CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=emea,DC=corp",
"alertID": 1,
"alertSeverityLevel": "medium",
"eventID": "2434"
},
"type": "alert"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"0\" \"1\" \"Alsid Forest\" \"emea.corp\" \"C-PASSWORD-POLICY\" \"critical\" \"OU=ORG,OU=Example,OU=Computers,OU=NDFRE,DC=emea,DC=corp\" \"28\" \"2\" \"R-LOCAL-ACCOUNTS-PWD-INHERITANCE-BLOCKED\" \"2434\" \"AttributeName\"=\"inf-system_access-lockoutbadcount\" \"OuCn\"=\"Packaging\"\n",
"event": {
"kind": "alert",
"outcome": "success"
},
"action": {
"name": "C-PASSWORD-POLICY",
"outcome": "success",
"outcome_reason": "R-LOCAL-ACCOUNTS-PWD-INHERITANCE-BLOCKED",
"properties": {
"ADdevianceID": 28,
"ADdomainName": "emea.corp",
"ADforestName": "Alsid Forest",
"ADobject": "OU=ORG,OU=Example,OU=Computers,OU=NDFRE,DC=emea,DC=corp",
"AttributeName": "inf-system_access-lockoutbadcount",
"OuCn": "Packaging",
"alertID": 1,
"alertSeverityLevel": "critical",
"eventID": "2434"
},
"type": "alert"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"1\" \"1\" \"Alsid Forest\" \"emea.corp\" \"CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=Emea,DC=corp\" \"2434\" \"UAC changed\" whenchanged=\"\"2020-01-09T09:24:41.0000000Z\"\"",
"event": {
"kind": "trailflow",
"outcome": "success"
},
"action": {
"name": "UAC changed",
"outcome": "success",
"properties": {
"ADdomainName": "emea.corp",
"ADforestName": "Alsid Forest",
"ADobject": "CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=Emea,DC=corp",
"alertID": 1,
"alsidAttributeName": "whenchanged",
"alsidAttributeValue": "\"2020-01-09T09:24:41.0000000Z\"",
"eventID": "2434",
"eventType": "UAC changed"
},
"type": "trailflow"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"1\" \"1\" \"Alsid Forest\" \"emea.corp\" \"CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=emea,DC=corp\" \"2432\" \"UAC changed\" useraccountcontrol=\"\"DONT_EXPIRE NORMAL \"\"",
"event": {
"kind": "trailflow",
"outcome": "success"
},
"action": {
"name": "UAC changed",
"outcome": "success",
"properties": {
"ADdomainName": "emea.corp",
"ADforestName": "Alsid Forest",
"ADobject": "CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=emea,DC=corp",
"alertID": 1,
"alsidAttributeName": "useraccountcontrol",
"alsidAttributeValue": "\"DONT_EXPIRE NORMAL \"",
"eventID": "2432",
"eventType": "UAC changed"
},
"type": "trailflow"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"1\" \"8\" \"AD.FOOBAR.COM\" \"AD\" \"\\\\AD.FOOBAR.COM\\sysvol\\AD.FOOBAR.COM\\Policies\\{SEK01A10-T35T-TEST-T35T-5EKO1AIO10}\\User\\Scripts\" \"7856795\" \"ACL change\" \"ntsecuritydescriptor\"=\"\"O:S-1-5-21-1519513455-2607746426-5380147357-40655D:AI(A;OICIID;FA;;;S-1-5-21-1519513455-2607746426-5380147357-512)(A;OICIID;FA;;;S-1-5-21-1519513455-2607746426-5380147357-519)(A;OICIID;0x1200a9;;;S-1-5-11)(A;OICIID;0x1200a9;;;S-1-5-9)(A;OICIID;FA;;;S-1-5-18)(A;ID;FA;;;S-1-5-21-1519513455-2607746426-5380147357-40655)(A;OICIIOID;FA;;;S-1-3-0)\"\"",
"event": {
"kind": "trailflow",
"outcome": "success"
},
"action": {
"name": "ACL change",
"outcome": "success",
"properties": {
"ADdomainName": "AD",
"ADforestName": "AD.FOOBAR.COM",
"ADobject": "\\\\AD.FOOBAR.COM\\sysvol\\AD.FOOBAR.COM\\Policies\\{SEK01A10-T35T-TEST-T35T-5EKO1AIO10}\\User\\Scripts",
"alertID": 8,
"alsidAttributeName": "\"ntsecuritydescriptor\"",
"alsidAttributeValue": "\"O:S-1-5-21-1519513455-2607746426-5380147357-40655D:AI(A;OICIID;FA;;;S-1-5-21-1519513455-2607746426-5380147357-512)(A;OICIID;FA;;;S-1-5-21-1519513455-2607746426-5380147357-519)(A;OICIID;0x1200a9;;;S-1-5-11)(A;OICIID;0x1200a9;;;S-1-5-9)(A;OICIID;FA;;;S-1-5-18)(A;ID;FA;;;S-1-5-21-1519513455-2607746426-5380147357-40655)(A;OICIIOID;FA;;;S-1-3-0)\"",
"eventID": "7856795",
"eventType": "ACL change"
},
"type": "trailflow"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
{
"message": "\"1\" \"8\" \"AD.FOOBAR.COM\" \"AD\" \"\\\\AD.FOOBAR.COM\\sysvol\\AD.FOOBAR.COM\\Policies\\{SEK01A10-T35T-TEST-T35T-5EKO1AIO10}\\GPT.INI\" \"7855399\" \"New object\" \"gptini-displayname\"=\"\"Nouvel objet Strat\u00e9gie de groupe\"\"",
"event": {
"kind": "trailflow",
"outcome": "success"
},
"action": {
"name": "New object",
"outcome": "success",
"properties": {
"ADdomainName": "AD",
"ADforestName": "AD.FOOBAR.COM",
"ADobject": "\\\\AD.FOOBAR.COM\\sysvol\\AD.FOOBAR.COM\\Policies\\{SEK01A10-T35T-TEST-T35T-5EKO1AIO10}\\GPT.INI",
"alertID": 8,
"alsidAttributeName": "\"gptini-displayname\"",
"alsidAttributeValue": "\"Nouvel objet Strat\u00e9gie de groupe\"",
"eventID": "7855399",
"eventType": "New object"
},
"type": "trailflow"
},
"service": {
"name": "active directory",
"type": "ldap"
}
}
Extracted Fields
The following table lists the fields that are extracted, normalized under the ECS format, analyzed and indexed by the parser. It should be noted that infered fields are not listed.
Name | Type | Description |
---|---|---|
action.properties.ADdevianceID |
number |
|
action.properties.ADdomainName |
keyword |
|
action.properties.ADforestName |
keyword |
|
action.properties.ADobject |
keyword |
|
action.properties.AadConnectDbServer |
keyword |
|
action.properties.Action |
keyword |
|
action.properties.ApproveCertifTestOptionChecked |
keyword |
|
action.properties.AttributeName |
keyword |
|
action.properties.CertificateNameDeviantAces |
keyword |
|
action.properties.ComputerCn |
keyword |
|
action.properties.CseGuid |
keyword |
|
action.properties.DangerousAceList |
keyword |
|
action.properties.DisplayName |
keyword |
|
action.properties.DistinguishedName |
keyword |
|
action.properties.DomainName |
keyword |
|
action.properties.EkuAttributeDeviantAces |
keyword |
|
action.properties.EkuContainAuthAttribute |
keyword |
|
action.properties.EkuContainAuthList |
keyword |
|
action.properties.EnrollmentFlagAttributeMisconfigured |
keyword |
|
action.properties.EnrollmentFlagDeviantAces |
keyword |
|
action.properties.ExpiryDate |
keyword |
|
action.properties.GpoName |
keyword |
|
action.properties.OperatingSystem |
keyword |
|
action.properties.OperatingSystemVersion |
keyword |
|
action.properties.OuCn |
keyword |
|
action.properties.ParentContainer |
keyword |
|
action.properties.PrivilegesPath |
keyword |
|
action.properties.RaSignatureAttributeDeviantAces |
keyword |
|
action.properties.RaSignatureAttributeMisconfigured |
keyword |
|
action.properties.SanConfigCsrMisconfigured |
keyword |
|
action.properties.SanConfigCsrOptionChecked |
keyword |
|
action.properties.TrustEnrollServiceAceOptionChecked |
keyword |
|
action.properties.TrustEnrollServicesList |
keyword |
|
action.properties.TrusteeCn |
keyword |
|
action.properties.alertID |
number |
|
action.properties.alertSeverityLevel |
keyword |
|
action.properties.alsidAttributeName |
keyword |
|
action.properties.alsidAttributeValue |
keyword |
|
action.properties.dc_ip |
keyword |
|
action.properties.dc_name |
keyword |
|
action.properties.eventID |
keyword |
|
action.properties.eventType |
keyword |
|
action.properties.field1 |
keyword |
|
action.properties.field2 |
keyword |
|
action.properties.field3 |
keyword |
|
action.properties.password_renewal_duration |
keyword |
|
action.properties.source_hostname |
keyword |
|
action.properties.source_ip |
keyword |
|
action.properties.targeted_dc_account |
keyword |
|
action.properties.tool |
keyword |
|
action.properties.user |
keyword |
|
event.kind |
keyword |
The kind of the event. The highest categorization field in the hierarchy. |
event.reason |
keyword |
Reason why this event happened, according to the source |
service.name |
keyword |
Name of the service. |
service.type |
keyword |
The type of the service. |
user.domain |
keyword |
Name of the directory the user is a member of. |
user.group.name |
keyword |
Name of the group. |
user.name |
keyword |
Short name or login of the user. |
For more information on the Intake Format, please find the code of the Parser, Smart Descriptions, and Supported Events here.