Files
hayabusa/rules/timeline-rules/Logons/4672-Admin-Logon.yml
Tanaka Zakku bad4429ad0 Rule tuning
2021-11-18 10:31:28 +09:00

22 lines
551 B
YAML

title: Admin Logon
description: Prints logon information
author: Zach Mathis
level: informational
detection:
selection:
Channel: Security
EventID: 4672
filter:
- SubjectUserName: "SYSTEM"
- SubjectUserName: "LOCAL SERVICE"
- SubjectUserName: "NETWORK SERVICE"
- SubjectUserName|endswith: "$"
condition: selection and not filter
falsepositives:
- normal system usage
output: 'User: %SubjectUserName% : LogonID: %SubjectLogonId%'
creation_date: 2021/11/17
updated_date: 2021/11/17