Skip to content

[BUG] Logic Problem in Detect Computer Changed with Anonymous Account #3961

@thegreatmhn

Description

@thegreatmhn

the detection rule original logic is as follow:
wineventlog_security EventCode=4624 OR EventCode=4742 TargetUserName="ANONYMOUS LOGON" LogonType=3
| stats count min(_time) as firstTime max(_time) as lastTime
BY action app authentication_method
dest dvc process
process_id process_name process_path
signature signature_id src
src_port status subject
user user_group vendor_product
| security_content_ctime(firstTime)
| security_content_ctime(lastTime)
| detect_computer_changed_with_anonymous_account_filter

there are two problem with this logic.
first problem is filtering EventCode=4742 does not effect in the query beacuse of the LogonType=3 field this field is not available in Event Code 4742 telemetry, so the Event Code 4742 doesnt work.

second problem is that the event 4624 filter is extra and not needed.

Metadata

Metadata

Assignees

Labels

bugSomething isn't working

Type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions