Detect changes to privileged groups in Active Directory that could indicate malicious or unexpected administrative activity.
These attempts are categorized as Credential Access / Account Manipulation.
The strategy will function as follows:
- Collect Windows Event Logs related to AD group changes.
- Compare AD group changes against a list of privileged groups.
- Alert on any unusual changes to privileged groups.
Privileged Groups are a list of abstract high-value targets in AD that provide privileged access or can be misused to perform privilege escalation. These include builtin AD groups (e.g. Account Operators, Domain Admins, Enterprise Admins) as well as custom groups which have been delegated sensitive permissions.
When configured correctly, AD Domain Controllers will record Event IDs for group modifications. The following event IDs are of interest for this ADS:
Event Code | Description |
---|---|
4727 | A security-enabled global group was created. |
4728 | A member was added to a security-enabled global group. |
4729 | A member was removed from a security-enabled global group. |
4730 | A security-enabled global group was deleted. |
4754 | A security-enabled universal group was created. |
4756 | A member was added to a security-enabled universal group. |
4757 | A member was removed from a security-enabled universal group. |
4758 | A security-enabled universal group was deleted. |
4764 | A group's type was changed. |
The following AD builtin groups are monitored for changes:
Group Name | Description |
---|---|
Administrators | Builtin administrators group for the domain |
Domain Admins | Builtin administrators group for the domain |
Enterprise Admins | Builtin administrators group for the domain |
Schema Admins | Highly privileged builtin group |
Account Operators | Highly privileged builtin group |
Backup Operators | Highly privileged builtin group |
This strategy relies on the following assumptions:
- Group change event auditing is enabled by GPO.
- Group change events are written to the Windows Event Log.
- The DCs are correctly forwarding the group change events to WEF servers.
- WEF servers are correctly forwarding events to the SIEM.
- SIEM is successfully indexing group change events.
A blind spot will occur if any of the assumptions are violated. For instance, the following would not trip the alert:
- Windows event logging breaks.
- A group is modified in a manner which does not generate an event log.
- A legitimate account in a sensitive group is hijacked.
- A sensitive group is not correctly added to the monitoring list.
There are several instances where false positives for this ADS could occur:
- Legitimate changes to the group are made as part of sanctioned systems administration activities.
- Automation scripts remove leavers from privileged groups.
The priority is set to high under the following conditions:
- A new user is added to a builtin Windows group.
- A new user is added to a Tier-0 administration group.
The priority is set to medium under the following conditions:
- A new user is added to a Tier-1 administration group.
The priority is set to low under the following conditions:
- The group modification event is a removal.
Validation can occur for this ADS by performing the following execution on a Windows host with RSAT installed:
Import-Module ActiveDirectory
Add-ADGroupMember -Identity "Account Operators" -Members <YourUsername>
Remove-ADGroupMember -Identity "Account Operators" -Members <YourUsername>
In the event that this alert fires, the following response procedures are recommended:
- Validate the group modified, user added and the user making the change.
- If the user making the change is not an administrator at the appropriate permissions level, escalate to a security incident.
- If the user added to the group is not a member of an administratively relevant team, escalate to a security incident.
- If the user added to the group is a new account, escalate to a security incident.
- Validate there is a change management ticket or announcement for the change.
- If there is no change management ticket or announcement, contact the user who made the change.
- If the user is unaware of the activity, escalate to a security incident.