Skip to content

Tenable Identity Exposure / Alsid

Overview

Alsid is an automated security solution that monitors the components of Active Directory infrastructures by detecting attacks in real time, identifying existing weaknesses and vulnerabilities.

The following Sekoia.io built-in rules match the intake Tenable Identity Exposure / Alsid. This documentation is updated automatically and is based solely on the fields used by the intake which are checked against our rules. This means that some rules will be listed but might not be relevant with the intake.

SEKOIA.IO x Tenable Identity Exposure / Alsid on ATT&CK Navigator

Account Added To A Security Enabled Group

Detection in order to investigate who has added a specific Domain User in Domain Admins or Group Policy Creator Owners (Security event 4728)

  • Effort: master
Account Removed From A Security Enabled Group

Detection in order to investigate who has removed a specific Domain User in Domain Admins or Group Policy Creator Owners (Security event 4729)

  • Effort: master
Computer Account Deleted

Detects computer account deletion.

  • Effort: master
Domain Trust Created Or Removed

A trust was created or removed to a domain. An attacker could perform that in order to do lateral movement easily between domains or shutdown the ability of two domains to communicate.

  • Effort: advanced
Password Change On Directory Service Restore Mode (DSRM) Account

The Directory Service Restore Mode (DSRM) account is a local administrator account on Domain Controllers. Attackers may change the password to gain persistence.

  • Effort: intermediate
Possible Replay Attack

This event can be a sign of Kerberos replay attack or, among other things, network device configuration or routing problems.

  • Effort: intermediate
Potential RDP Connection To Non-Domain Host

Detects logons using NTLM to hosts that are potentially not part of the domain using RDP (TermSrv). Event ID 8001 corresponds to outgoing NTLM authentication traffic and TermSrv stands for RDP Terminal Services Server. Check if the contacted host is legitimate. To use this detection rule, enable logging of outbound NTLM authentications on all domain controllers, using the following Group Policy (GPO) - Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options > Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers -> Define this policy setting: Audit all.

  • Effort: master
Tenable Identity Exposure / Alsid Critical Severity Alert

Tenable Identity Exposure / Alsid raised a critical severity alert.

  • Effort: master
Tenable Identity Exposure / Alsid High Severity Alert

Tenable Identity Exposure / Alsid raised an alert.

  • Effort: master
User Account Created

Detects user creation on windows servers, which shouldn't happen in an Active Directory environment. Apply this on your windows server logs and not on your DC logs. One default account defaultuser0 is excluded as only used during Windows set-up. This detection use Security Event ID 4720.

  • Effort: master
User Account Deleted

Detects local user deletion

  • Effort: master

Event Categories

The following table lists the data source offered by this integration.

Data Source Description
Application logs Alsid events bring information from Active Directory logs
Authentication logs Alsid alerts provide details on anomalies/threats detected in authentication logs
Network protocol analysis information on LDAP, DNS and Kerberos protocols are collected through Alsid logs

In details, the following table denotes the type of events produced by this integration.

Name Values
Kind alert, trailflow
Category ``
Type ``

Event Samples

Find below few samples of events and how they are normalized by Sekoia.io.

{
    "message": "\"0\" \"1\" \"ad.corp\" \"ad.corp\" \"C-PKI-DANG-ACCESS\" \"critical\" \"CN=DSCUCNExport,CN=Certificate \nTemplates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=corp\" \"1996840\" \"2\" \n\"R-CERTIF-TEMPLATE-MISCONFIG\" \"76485473\" \"DisplayName\"=\"DSC UCN Export\" \"DomainName\"=\"ad.corp\" \n\"DangerousAceList\"=\"[{\"Item1\":\"OA;;CR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1229472208-2678311744-2345022811-34\n5849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.corp\\\\AC750-DSI-SDAT-Espace de \ntravail-FOO-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended \nright\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"OA;;RPWPCR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-109881018\n9-8133351-2328693739-515\",\"Item2\":\"S-1-5-21-1098810189-8133351-2328693739-515\",\"Item3\":\"ad.corp\\\\Ordinateurs du \ndomaine\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended \nright\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\"\n,\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.corp\\\\AC750-DSI-SDAT-Espace de \ntravail-FOO-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Write all properties\",\"Item2\":\"\"}]}]\" \n\"TrustEnrollServiceAceOptionChecked\"=\"\u2610\" \"TrustEnrollServicesList\"=\"\u29b0\" \"ApproveCertifTestOptionChecked\"=\"\u2610\" \n\"EnrollmentFlagDeviantAces\"=\"?\" \"EnrollmentFlagAttributeMisconfigured\"=\"?\" \"RaSignatureAttributeDeviantAces\"=\"\u274c\ufe0f\" \n\"RaSignatureAttributeMisconfigured\"=\"\u274c\ufe0f\" \"EkuAttributeDeviantAces\"=\"\u274c\ufe0f\" \"EkuContainAuthAttribute\"=\"\u2714\ufe0f\" \n\"EkuContainAuthList\"=\"\u29b0\" \"SanConfigCsrOptionChecked\"=\"\u2612\" \"CertificateNameDeviantAces\"=\"\u274c\ufe0f\" \n\"SanConfigCsrMisconfigured\"=\"\u2714\ufe0f\"",
    "event": {
        "kind": "alert",
        "outcome": "success"
    },
    "action": {
        "name": "C-PKI-DANG-ACCESS",
        "outcome": "success",
        "outcome_reason": "R-CERTIF-TEMPLATE-MISCONFIG",
        "properties": {
            "ADdevianceID": 1996840,
            "ADdomainName": "ad.corp",
            "ADforestName": "ad.corp",
            "ADobject": "CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=corp",
            "ApproveCertifTestOptionChecked": "\u2610",
            "CertificateNameDeviantAces": "\u274c\ufe0f",
            "DangerousAceList": "{\"Item1\":\"OA;;CR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.corp\\\\AC750-DSI-SDAT-Espace de travail-FOO-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended right\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"OA;;RPWPCR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1098810189-8133351-2328693739-515\",\"Item2\":\"S-1-5-21-1098810189-8133351-2328693739-515\",\"Item3\":\"ad.corp\\\\Ordinateurs du domaine\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended right\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.corp\\\\AC750-DSI-SDAT-Espace de travail-FOO-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Write all properties\",\"Item2\":\"\"}]}",
            "DisplayName": "DSC UCN Export",
            "DomainName": "ad.corp",
            "EkuAttributeDeviantAces": "\u274c\ufe0f",
            "EkuContainAuthAttribute": "\u2714\ufe0f",
            "EkuContainAuthList": "\u29b0",
            "EnrollmentFlagAttributeMisconfigured": "?",
            "EnrollmentFlagDeviantAces": "?",
            "RaSignatureAttributeDeviantAces": "\u274c\ufe0f",
            "RaSignatureAttributeMisconfigured": "\u274c\ufe0f",
            "SanConfigCsrMisconfigured": "\u2714\ufe0f",
            "SanConfigCsrOptionChecked": "\u2612",
            "TrustEnrollServiceAceOptionChecked": "\u2610",
            "TrustEnrollServicesList": "\u29b0",
            "alertID": 1,
            "alertSeverityLevel": "critical",
            "eventID": "76485473"
        },
        "type": "alert"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"0\" \"1\" \"ad.domain\" \"ad.domain\" \"C-PKI-DANG-ACCESS\" \"critical\" \"CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain\" \"1996839\" \"2\" \"R-CERTIF-TEMPLATE-ACL\" \"76485473\"      \n \"DistinguishedName\"=\"CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain\"                                                                                                             \n \"DangerousAceList\"=\"[{\"Item1\":\"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.domain\\\\AC750-DSI-FOO-Espace de                               \n travail-GSW-Adm\",\"Item4\":[{\"Item1\":\"Modify permissions\",\"Item2\":\"\"},{\"Item1\":\"Modify owner\",\"Item2\":\"\"},{\"Item1\":\"Write all properties\",\"Item2\":\"\"}]}]\"",
    "event": {
        "kind": "alert",
        "outcome": "success"
    },
    "action": {
        "name": "C-PKI-DANG-ACCESS",
        "outcome": "success",
        "outcome_reason": "R-CERTIF-TEMPLATE-ACL",
        "properties": {
            "ADdevianceID": 1996839,
            "ADdomainName": "ad.domain",
            "ADforestName": "ad.domain",
            "ADobject": "CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain",
            "DangerousAceList": "{\"Item1\": \"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\", \"Item2\": \"S-1-5-21-1229472208-2678311744-2345022811-345849\", \"Item3\": \"urdom.ad.domain\\\\AC750-DSI-FOO-Espace de                                travail-GSW-Adm\", \"Item4\": [{\"Item1\": \"Modify permissions\", \"Item2\": \"\"}, {\"Item1\": \"Modify owner\", \"Item2\": \"\"}, {\"Item1\": \"Write all properties\", \"Item2\": \"\"}]}",
            "DistinguishedName": "CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain",
            "alertID": 1,
            "alertSeverityLevel": "critical",
            "eventID": "76485473"
        },
        "type": "alert"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"0\" \"1\" \"ad.domain\" \"ad.domain\" \"C-PKI-DANG-ACCESS\" \"critical\" \"CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain\" \"1996840\" \"2\" \n\"R-CERTIF-TEMPLATE-MISCONFIG\" \"76485473\" \"DisplayName\"=\"DSC UCN Export\" \"DomainName\"=\"ad.domain\" \n\"DangerousAceList\"=\"[{\"Item1\":\"OA;;CR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item\n3\":\"urdom.ad.domain\\\\AC750-DSI-SDAT-Espace de travail-GSW-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended \nright\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"OA;;RPWPCR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1098810189-8133351-2328693739-515\",\"Item2\":\"S-1-5-21-1098810189-8133351-2328693\n739-515\",\"Item3\":\"ad.domain\\\\Ordinateurs du domaine\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended \nright\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"u\nrdom.ad.domain\\\\AC750-DSI-SDAT-Espace de travail-GSW-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Write all properties\",\"Item2\":\"\"}]}]\" \"TrustEnrollServiceAceOptionChecked\"=\"\u2610\" \n\"TrustEnrollServicesList\"=\"\u29b0\" \"ApproveCertifTestOptionChecked\"=\"\u2610\" \"EnrollmentFlagDeviantAces\"=\"?\" \"EnrollmentFlagAttributeMisconfigured\"=\"?\" \"RaSignatureAttributeDeviantAces\"=\"\u274c\ufe0f\" \n\"RaSignatureAttributeMisconfigured\"=\"\u274c\ufe0f\" \"EkuAttributeDeviantAces\"=\"\u274c\ufe0f\" \"EkuContainAuthAttribute\"=\"\u2714\ufe0f\" \"EkuContainAuthList\"=\"\u29b0\" \"SanConfigCsrOptionChecked\"=\"\u2612\" \n\"CertificateNameDeviantAces\"=\"\u274c\ufe0f\" \"SanConfigCsrMisconfigured\"=\"\u2714\ufe0f\"",
    "event": {
        "kind": "alert",
        "outcome": "success"
    },
    "action": {
        "name": "C-PKI-DANG-ACCESS",
        "outcome": "success",
        "outcome_reason": "R-CERTIF-TEMPLATE-MISCONFIG",
        "properties": {
            "ADdevianceID": 1996840,
            "ADdomainName": "ad.domain",
            "ADforestName": "ad.domain",
            "ADobject": "CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain",
            "ApproveCertifTestOptionChecked": "\u2610",
            "CertificateNameDeviantAces": "\u274c\ufe0f",
            "DangerousAceList": "{\"Item1\":\"OA;;CR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.domain\\\\AC750-DSI-SDAT-Espace de travail-GSW-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended right\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"OA;;RPWPCR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1098810189-8133351-2328693739-515\",\"Item2\":\"S-1-5-21-1098810189-8133351-2328693739-515\",\"Item3\":\"ad.domain\\\\Ordinateurs du domaine\",\"Item4\":[{\"Item1\":\"[Certificate Template] Extended right\",\"Item2\":\"Certificate-Enrollment\"}]},{\"Item1\":\"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.domain\\\\AC750-DSI-SDAT-Espace de travail-GSW-Adm\",\"Item4\":[{\"Item1\":\"[Certificate Template] Write all properties\",\"Item2\":\"\"}]}",
            "DisplayName": "DSC UCN Export",
            "DomainName": "ad.domain",
            "EkuAttributeDeviantAces": "\u274c\ufe0f",
            "EkuContainAuthAttribute": "\u2714\ufe0f",
            "EkuContainAuthList": "\u29b0",
            "EnrollmentFlagAttributeMisconfigured": "?",
            "EnrollmentFlagDeviantAces": "?",
            "RaSignatureAttributeDeviantAces": "\u274c\ufe0f",
            "RaSignatureAttributeMisconfigured": "\u274c\ufe0f",
            "SanConfigCsrMisconfigured": "\u2714\ufe0f",
            "SanConfigCsrOptionChecked": "\u2612",
            "TrustEnrollServiceAceOptionChecked": "\u2610",
            "TrustEnrollServicesList": "\u29b0",
            "alertID": 1,
            "alertSeverityLevel": "critical",
            "eventID": "76485473"
        },
        "type": "alert"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"0\" \"1\" \"ad.domain\" \"ad.domain\" \"C-PKI-DANG-ACCESS\" \"critical\" \"CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain\" \"1996839\" \"2\" \"R-CERTIF-TEMPLATE-ACL\" \n\"76485473\" \"DistinguishedName\"=\"CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain\" \n\"DangerousAceList\"=\"[{\"Item1\":\"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item2\":\"S-1-5-21-1229472208-2678311744-2345022811-345849\",\"Item3\":\"urdom.ad.domain\\\\AC750-DSI-SDAT-Espace de \ntravail-GSW-Adm\",\"Item4\":[{\"Item1\":\"Modify permissions\",\"Item2\":\"\"},{\"Item1\":\"Modify owner\",\"Item2\":\"\"},{\"Item1\":\"Write all properties\",\"Item2\":\"\"}]}]\"",
    "event": {
        "kind": "alert",
        "outcome": "success"
    },
    "action": {
        "name": "C-PKI-DANG-ACCESS",
        "outcome": "success",
        "outcome_reason": "R-CERTIF-TEMPLATE-ACL",
        "properties": {
            "ADdevianceID": 1996839,
            "ADdomainName": "ad.domain",
            "ADforestName": "ad.domain",
            "ADobject": "CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain",
            "DangerousAceList": "{\"Item1\": \"A;;LCRPWPRCWDWO;;;S-1-5-21-1229472208-2678311744-2345022811-345849\", \"Item2\": \"S-1-5-21-1229472208-2678311744-2345022811-345849\", \"Item3\": \"urdom.ad.domain\\\\AC750-DSI-SDAT-Espace de travail-GSW-Adm\", \"Item4\": [{\"Item1\": \"Modify permissions\", \"Item2\": \"\"}, {\"Item1\": \"Modify owner\", \"Item2\": \"\"}, {\"Item1\": \"Write all properties\", \"Item2\": \"\"}]}",
            "DistinguishedName": "CN=DSCUCNExport,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ad,DC=domain",
            "alertID": 1,
            "alertSeverityLevel": "critical",
            "eventID": "76485473"
        },
        "type": "alert"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"0\" \"1\" \"ad.domain\" \"urdom.ad.domain\" \"C-GPO-EXEC-SANITY\" \"high\" \"CN={3D4A6260-9D6C-4062-B56B-DC6D419333CE},CN=Policies,CN=System,DC=urdom,DC=ad,DC=domain\" \"2008125\" \"2\" \n\"R-GPO-EXEC-SANITY-UNKNOWN-CSE\" \"79016668\" \"CseGuid\"=\"{8472c2c4-6b70-4301-a20d-a6cea5f82b7e}\" \"AttributeName\"=\"GpcMachineExtensionName\" \"GpoName\"=\"#URDOM-APP-RSAT-TEST\"",
    "event": {
        "kind": "alert",
        "outcome": "success"
    },
    "action": {
        "name": "C-GPO-EXEC-SANITY",
        "outcome": "success",
        "outcome_reason": "R-GPO-EXEC-SANITY-UNKNOWN-CSE",
        "properties": {
            "ADdevianceID": 2008125,
            "ADdomainName": "urdom.ad.domain",
            "ADforestName": "ad.domain",
            "ADobject": "CN={3D4A6260-9D6C-4062-B56B-DC6D419333CE},CN=Policies,CN=System,DC=urdom,DC=ad,DC=domain",
            "AttributeName": "GpcMachineExtensionName",
            "CseGuid": "{8472c2c4-6b70-4301-a20d-a6cea5f82b7e}",
            "GpoName": "#URDOM-APP-RSAT-TEST",
            "alertID": 1,
            "alertSeverityLevel": "high",
            "eventID": "79016668"
        },
        "type": "alert"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"0\" \"1\" \"ad.domain\" \"urdom.ad.domain\" \"C-OBSOLETE-SYSTEMS\" \"high\"   \n \"CN=cnpsp16bd,OU=Sharepoint,OU=Production,OU=DataCenter,OU=Serveurs,OU=DataC \n ter,DC=urdom,DC=ad,DC=domain\" \"2007590\" \"2\" \"R-SLEEPING-OBSOLETE-SYSTEMS\"      \n \"78964369\" \"ComputerCn\"=\"cnpsp16bd\" \"OperatingSystem\"=\"Windows Server 2012 R2  \n Standard\" \"OperatingSystemVersion\"=\"6.3 (9600)\"",
    "event": {
        "kind": "alert",
        "outcome": "success"
    },
    "action": {
        "name": "C-OBSOLETE-SYSTEMS",
        "outcome": "success",
        "outcome_reason": "R-SLEEPING-OBSOLETE-SYSTEMS",
        "properties": {
            "ADdevianceID": 2007590,
            "ADdomainName": "urdom.ad.domain",
            "ADforestName": "ad.domain",
            "ADobject": "CN=cnpsp16bd,OU=Sharepoint,OU=Production,OU=DataCenter,OU=Serveurs,OU=DataC  ter,DC=urdom,DC=ad,DC=domain",
            "ComputerCn": "cnpsp16bd",
            "OperatingSystem": "Windows Server 2012 R2   Standard",
            "OperatingSystemVersion": "6.3 (9600)",
            "alertID": 1,
            "alertSeverityLevel": "high",
            "eventID": "78964369"
        },
        "type": "alert"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"2\" \"21\" \"foo.ad.com\" \"AD\" \"Suspicious DC Password Change\" \"critical\" \"Unknown\" \"Unknown\" \"HOSTNAME-040\" \"10.17.92.40\" \"user\"=\"ANONYMOUS LOGON\" \"source_hostname\"=\"Unknown\" \"source_ip\"=\"Unknown\" \"dc_name\"=\"HOSTNAME-040\" \"dc_ip\"=\"10.17.92.40\" \"targeted_dc_account\"=\"USERNAME-002$\" \"tool\"=\"foo-script\" \"password_renewal_duration\"=\"30:04:30:05\"",
    "event": {
        "kind": "alert"
    },
    "action": {
        "properties": {
            "ADdomainName": "AD",
            "ADforestName": "foo.ad.com",
            "ADobject": "Suspicious DC Password Change",
            "alertID": 21,
            "dc_ip": "10.17.92.40",
            "dc_name": "HOSTNAME-040",
            "eventID": "critical",
            "eventType": "Unknown",
            "field1": "Unknown",
            "field2": "HOSTNAME-040",
            "field3": "10.17.92.40",
            "password_renewal_duration": "30:04:30:05",
            "source_hostname": "Unknown",
            "source_ip": "Unknown",
            "targeted_dc_account": "USERNAME-002$",
            "tool": "foo-script",
            "user": "ANONYMOUS LOGON"
        },
        "type": "alert"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"0\" \"1\" \"Alsid Forest\" \"emea.corp\" \"C-PASSWORD-DONT-EXPIRE\" \"medium\" \"CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=emea,DC=corp\" \"28\" \"1\" \"R-DONT-EXPIRE-SET\" \"2434\" \"TrusteeCn\"=\"GustavoFring\"",
    "event": {
        "kind": "alert",
        "outcome": "success"
    },
    "action": {
        "name": "C-PASSWORD-DONT-EXPIRE",
        "outcome": "success",
        "outcome_reason": "R-DONT-EXPIRE-SET",
        "properties": {
            "ADdevianceID": 28,
            "ADdomainName": "emea.corp",
            "ADforestName": "Alsid Forest",
            "ADobject": "CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=emea,DC=corp",
            "TrusteeCn": "GustavoFring",
            "alertID": 1,
            "alertSeverityLevel": "medium",
            "eventID": "2434"
        },
        "type": "alert"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"0\" \"1\" \"Corp Forest\" \"alsid.corp\" \"C-UNCONST-DELEG\" \"critical\" \"CN=ALSID-LAB-SERVE,OU=AlsidComputers,DC=alsid,DC=corp\" \"1\" \"1\" \"R-UNCONST-DELEG\" \"2\" \"AadConnectDbServer\"=\"127.0.0.1\" \"Action\"=\"Write-Property\"",
    "event": {
        "kind": "alert",
        "outcome": "success"
    },
    "action": {
        "name": "C-UNCONST-DELEG",
        "outcome": "success",
        "outcome_reason": "R-UNCONST-DELEG",
        "properties": {
            "ADdevianceID": 1,
            "ADdomainName": "alsid.corp",
            "ADforestName": "Corp Forest",
            "ADobject": "CN=ALSID-LAB-SERVE,OU=AlsidComputers,DC=alsid,DC=corp",
            "AadConnectDbServer": "127.0.0.1",
            "Action": "Write-Property",
            "alertID": 1,
            "alertSeverityLevel": "critical",
            "eventID": "2"
        },
        "type": "alert"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"0\" \"1\" \"Alsid Forest\" \"emea.corp\" \"C-PASSWORD-DONT-EXPIRE\" \"medium\" \"CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=emea,DC=corp\" \"28\" \"1\" \"R-DONT-EXPIRE-SET\" \"2434\"",
    "event": {
        "kind": "alert",
        "outcome": "success"
    },
    "action": {
        "name": "C-PASSWORD-DONT-EXPIRE",
        "outcome": "success",
        "outcome_reason": "R-DONT-EXPIRE-SET",
        "properties": {
            "ADdevianceID": 28,
            "ADdomainName": "emea.corp",
            "ADforestName": "Alsid Forest",
            "ADobject": "CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=emea,DC=corp",
            "alertID": 1,
            "alertSeverityLevel": "medium",
            "eventID": "2434"
        },
        "type": "alert"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"0\" \"1\" \"Alsid Forest\" \"emea.corp\" \"C-PASSWORD-POLICY\" \"critical\" \"OU=ORG,OU=Example,OU=Computers,OU=NDFRE,DC=emea,DC=corp\" \"28\" \"2\" \"R-LOCAL-ACCOUNTS-PWD-INHERITANCE-BLOCKED\" \"2434\" \"AttributeName\"=\"inf-system_access-lockoutbadcount\" \"OuCn\"=\"Packaging\"\n",
    "event": {
        "kind": "alert",
        "outcome": "success"
    },
    "action": {
        "name": "C-PASSWORD-POLICY",
        "outcome": "success",
        "outcome_reason": "R-LOCAL-ACCOUNTS-PWD-INHERITANCE-BLOCKED",
        "properties": {
            "ADdevianceID": 28,
            "ADdomainName": "emea.corp",
            "ADforestName": "Alsid Forest",
            "ADobject": "OU=ORG,OU=Example,OU=Computers,OU=NDFRE,DC=emea,DC=corp",
            "AttributeName": "inf-system_access-lockoutbadcount",
            "OuCn": "Packaging",
            "alertID": 1,
            "alertSeverityLevel": "critical",
            "eventID": "2434"
        },
        "type": "alert"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"1\" \"1\" \"Alsid Forest\" \"emea.corp\" \"CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=Emea,DC=corp\" \"2434\" \"UAC changed\" whenchanged=\"\"2020-01-09T09:24:41.0000000Z\"\"",
    "event": {
        "kind": "trailflow",
        "outcome": "success"
    },
    "action": {
        "name": "UAC changed",
        "outcome": "success",
        "properties": {
            "ADdomainName": "emea.corp",
            "ADforestName": "Alsid Forest",
            "ADobject": "CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=Emea,DC=corp",
            "alertID": 1,
            "alsidAttributeName": "whenchanged",
            "alsidAttributeValue": "\"2020-01-09T09:24:41.0000000Z\"",
            "eventID": "2434",
            "eventType": "UAC changed"
        },
        "type": "trailflow"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"1\" \"1\" \"Alsid Forest\" \"emea.corp\" \"CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=emea,DC=corp\" \"2432\" \"UAC changed\" useraccountcontrol=\"\"DONT_EXPIRE NORMAL \"\"",
    "event": {
        "kind": "trailflow",
        "outcome": "success"
    },
    "action": {
        "name": "UAC changed",
        "outcome": "success",
        "properties": {
            "ADdomainName": "emea.corp",
            "ADforestName": "Alsid Forest",
            "ADobject": "CN=Gustavo Fring,OU=Los_Pollos_Hermanos,OU=Emea,DC=emea,DC=corp",
            "alertID": 1,
            "alsidAttributeName": "useraccountcontrol",
            "alsidAttributeValue": "\"DONT_EXPIRE NORMAL \"",
            "eventID": "2432",
            "eventType": "UAC changed"
        },
        "type": "trailflow"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"1\" \"8\" \"AD.FOOBAR.COM\" \"AD\" \"\\\\AD.FOOBAR.COM\\sysvol\\AD.FOOBAR.COM\\Policies\\{SEK01A10-T35T-TEST-T35T-5EKO1AIO10}\\User\\Scripts\" \"7856795\" \"ACL change\" \"ntsecuritydescriptor\"=\"\"O:S-1-5-21-1519513455-2607746426-5380147357-40655D:AI(A;OICIID;FA;;;S-1-5-21-1519513455-2607746426-5380147357-512)(A;OICIID;FA;;;S-1-5-21-1519513455-2607746426-5380147357-519)(A;OICIID;0x1200a9;;;S-1-5-11)(A;OICIID;0x1200a9;;;S-1-5-9)(A;OICIID;FA;;;S-1-5-18)(A;ID;FA;;;S-1-5-21-1519513455-2607746426-5380147357-40655)(A;OICIIOID;FA;;;S-1-3-0)\"\"",
    "event": {
        "kind": "trailflow",
        "outcome": "success"
    },
    "action": {
        "name": "ACL change",
        "outcome": "success",
        "properties": {
            "ADdomainName": "AD",
            "ADforestName": "AD.FOOBAR.COM",
            "ADobject": "\\\\AD.FOOBAR.COM\\sysvol\\AD.FOOBAR.COM\\Policies\\{SEK01A10-T35T-TEST-T35T-5EKO1AIO10}\\User\\Scripts",
            "alertID": 8,
            "alsidAttributeName": "\"ntsecuritydescriptor\"",
            "alsidAttributeValue": "\"O:S-1-5-21-1519513455-2607746426-5380147357-40655D:AI(A;OICIID;FA;;;S-1-5-21-1519513455-2607746426-5380147357-512)(A;OICIID;FA;;;S-1-5-21-1519513455-2607746426-5380147357-519)(A;OICIID;0x1200a9;;;S-1-5-11)(A;OICIID;0x1200a9;;;S-1-5-9)(A;OICIID;FA;;;S-1-5-18)(A;ID;FA;;;S-1-5-21-1519513455-2607746426-5380147357-40655)(A;OICIIOID;FA;;;S-1-3-0)\"",
            "eventID": "7856795",
            "eventType": "ACL change"
        },
        "type": "trailflow"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}
{
    "message": "\"1\" \"8\" \"AD.FOOBAR.COM\" \"AD\" \"\\\\AD.FOOBAR.COM\\sysvol\\AD.FOOBAR.COM\\Policies\\{SEK01A10-T35T-TEST-T35T-5EKO1AIO10}\\GPT.INI\" \"7855399\" \"New object\" \"gptini-displayname\"=\"\"Nouvel objet Strat\u00e9gie de groupe\"\"",
    "event": {
        "kind": "trailflow",
        "outcome": "success"
    },
    "action": {
        "name": "New object",
        "outcome": "success",
        "properties": {
            "ADdomainName": "AD",
            "ADforestName": "AD.FOOBAR.COM",
            "ADobject": "\\\\AD.FOOBAR.COM\\sysvol\\AD.FOOBAR.COM\\Policies\\{SEK01A10-T35T-TEST-T35T-5EKO1AIO10}\\GPT.INI",
            "alertID": 8,
            "alsidAttributeName": "\"gptini-displayname\"",
            "alsidAttributeValue": "\"Nouvel objet Strat\u00e9gie de groupe\"",
            "eventID": "7855399",
            "eventType": "New object"
        },
        "type": "trailflow"
    },
    "service": {
        "name": "active directory",
        "type": "ldap"
    }
}

Extracted Fields

The following table lists the fields that are extracted, normalized under the ECS format, analyzed and indexed by the parser. It should be noted that infered fields are not listed.

Name Type Description
action.properties.ADdevianceID number
action.properties.ADdomainName keyword
action.properties.ADforestName keyword
action.properties.ADobject keyword
action.properties.AadConnectDbServer keyword
action.properties.Action keyword
action.properties.ApproveCertifTestOptionChecked keyword
action.properties.AttributeName keyword
action.properties.CertificateNameDeviantAces keyword
action.properties.ComputerCn keyword
action.properties.CseGuid keyword
action.properties.DangerousAceList keyword
action.properties.DisplayName keyword
action.properties.DistinguishedName keyword
action.properties.DomainName keyword
action.properties.EkuAttributeDeviantAces keyword
action.properties.EkuContainAuthAttribute keyword
action.properties.EkuContainAuthList keyword
action.properties.EnrollmentFlagAttributeMisconfigured keyword
action.properties.EnrollmentFlagDeviantAces keyword
action.properties.ExpiryDate keyword
action.properties.GpoName keyword
action.properties.OperatingSystem keyword
action.properties.OperatingSystemVersion keyword
action.properties.OuCn keyword
action.properties.RaSignatureAttributeDeviantAces keyword
action.properties.RaSignatureAttributeMisconfigured keyword
action.properties.SanConfigCsrMisconfigured keyword
action.properties.SanConfigCsrOptionChecked keyword
action.properties.TrustEnrollServiceAceOptionChecked keyword
action.properties.TrustEnrollServicesList keyword
action.properties.TrusteeCn keyword
action.properties.alertID number
action.properties.alertSeverityLevel keyword
action.properties.alsidAttributeName keyword
action.properties.alsidAttributeValue keyword
action.properties.dc_ip keyword
action.properties.dc_name keyword
action.properties.eventID keyword
action.properties.eventType keyword
action.properties.field1 keyword
action.properties.field2 keyword
action.properties.field3 keyword
action.properties.password_renewal_duration keyword
action.properties.source_hostname keyword
action.properties.source_ip keyword
action.properties.targeted_dc_account keyword
action.properties.tool keyword
action.properties.user keyword
event.kind keyword The kind of the event. The highest categorization field in the hierarchy.
event.reason keyword Reason why this event happened, according to the source
service.name keyword Name of the service.
service.type keyword The type of the service.

Configure

As of now, the main solution to collect Alsid logs leverages the Rsyslog recipe. Please share your experiences with other recipes by editing this documentation.

Rsyslog

Please refer to the documentation of Alsid to forward events to your rsyslog server. The reader is also invited to consult the Rsyslog Transport documentation to forward these logs to Sekoia.io.