Files
hayabusa/rules/Security/_4625.yml
Tanaka Zakku f29b7d2d1a Updated rules
2021-11-06 09:51:38 +09:00

15 lines
433 B
YAML

title: An account failed to log on
description: hogehoge
ignore: true
author: DeepblueCLI, Zach Mathis
detection:
selection:
Channel: Security
EventID: 4625
# condition: selection | count(TargetUserName) > 3
falsepositives:
- unknown
output: 'High number of logon failures for one account UserName:%event_data.SubjectUserName% Total logon faiures:%count%'
creation_date: 2020/11/8
updated_date: 2020/11/8