[New Rule] Added user account#574
[New Rule] Added user account#574janniten wants to merge 4 commits intoelastic:mainfrom janniten:added-user-account
Conversation
|
Hi @janniten. Thanks for opening this pull request 🥳 I really like how you're utilizing ECS in your queries to alert on behavior across different platforms. I believe that some security teams, especially those that are monitoring large networks, will not want to be alerted each time a new user account is created. Do you have any ideas or suggestions on how to narrow the scope of this rule to alert on suspicious behavior and minimize false positives for security analysts? |
|
Hi @threat-punter,
My thoughts: Now I'm using this rule in an hospital, where there are many "hands" creating users across different platforms. and since they don't have an Identity Management platform nor dedicated security administrators we need to keep track this activities I can close the PR if the rule is not useful in general, no problem :) Thank you! (**) there are some experimental changes in ECS 1.7.0 that uses a different way to model user relationships in an event. |
|
Thanks for your detailed response @janniten. I think that this will be better suited as a custom rule for security teams, who want to alert on every user creation event. |

Summary
Detecting when an user is being created is important not only because it can be an indicator that the system is compromised and an attacker is trying to increase access to a system/domain but also when legal activities needs to be audited for compliance
There is one detection rule for windows "User Account Creation" that is base on the analysis of process execution and process execution arguments.
This rule is cross-plataform and it is based on ECS event fields (category, type and outcome) and it works well for the standard winlogbeat logs, auditbeat logs and also for custom logs mapped into ECS (example Fortinet's logid 0100032132)