What's New Windows 10 Security Log Whitepaper 2015

Randy Franklin Smith January 2016 Scoping User Privileges After a system is compromised, the first action of a threat actor is to assess the current state of access by determining whether the breached user is privileged and if it is not, they will search for other accounts with higher privileges on the compromised machine. This kind of information potentially allows the threat actor to target those users via pass-the-hash attacks. Event 4798: To Which Groups Does This User Belong? When a user’s local group memberships are enumerated, Windows 10 now generates event ID 4798, as shown in the following figure. This event documents the enumeration, which user was enumerated, the user who requested the enumeration, and which process was used to perform the enumeration. Seeing an enumeration performed by any account other than the domain admin (which might be modifying local memberships) or via any process other than MMC.exe (such as via a NET LOCAL command) might indicate inappropriate activity. These details can help a Security Information and Event Management (SIEM) solution properly filter out approved activity. To generate this detailed event, you need to enable the Audit User Account Management policy. You should enable this policy on all endpoints, including domain controllers. On domain controllers, this audit policy tracks the enumeration of domain user accounts, whereas member servers and Windows 10 clients track the enumeration of local user accounts. What’s New in the Windows 10 Security Log | Copyright © LogRhythm 2016 Page 3 Randy Franklin Smith January 2016 Event 4799: Who Are Members of This Local Group? In another spin on the same attack vector, a threat actor starts with a known local group (such as the local Administrators group) and works to figure out who is in that group by enumerating its members (instead of starting with a user and enumerating the groups to which that user belongs). When local groups are enumerated, Windows 10 can be configured to generate event 4799, which documents the enumerated group, the user that requested the enumeration, and the process name that was used to perform the enumeration. This event requires you to enable generation of the Audit Security Group Management policy. LogRhythm MDI Insight Using dynamic baselining, focus on the responsible process—typically Microsoft Management Console (MMC). Use trending to identify what is “normal” in your environment and to notify you when a new process is responsible for causing this event. Even if the appropriate process changes in the next version of Windows, the beauty of dynamic baselining is that IT gets a notification the first time the responsible process changes, at which time IT can determine whether action is required. That new process then becomes part of the baseline, eliminating multiple false positives. What’s New in the Windows 10 Security Log | Copyright © LogRhythm 2016 Page 4
Please complete the form to gain access to this content