Files
hayabusa/rules/Security/_4648.yml
Tanaka Zakku f29b7d2d1a Updated rules
2021-11-06 09:51:38 +09:00

15 lines
633 B
YAML

title: An account failed to log on
description: hogehoge
ignore: true
author: DeepblueCLI, Zach Mathis
detection:
selection:
Channel: Security
EventID: 4648
# condition: selection | count(TargetUserName) > 3
falsepositives:
- unknown
output: 'Distributed Account Explicit Credential Use (Password Spray Attack)¥n The use of multiple user account access attempts with explicit credentials is ¥nan indicator of a password spray attack.¥nTarget Usernames:%TargetUserName$¥nAccessing Username: %SubjectUserName%¥nAccessing Host Name: %SubjectDomainName%'
creation_date: 2020/11/8
updated_date: 2020/11/8