Rules Contributing to Suspicious Kerberos Authentication from Golden Certificate Alert
    
                                            The following rules are used to identify suspicious Kerberos certificate-based authentication activity potentially resulting from Golden Certificate in Active Directory. Any one or more of these will trigger the Suspicious Kerberos Authentication from Golden Certificate Alert. Details for each rule can be viewed by clicking the More Details link in the description.
| Title | Description | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Suspicious Active Directory Kerberos Certificate Authentication | A Golden Certificate is a persistence technique that expands upon an AD CS compromise. If malicious actors obtain administrative access to a CA, they can extract a CA certificate and private key. Once obtained, these can be used to forge valid certificates for client authentication to impersonate any other user object in the domain. This rule detects unusual certificate usage by monitoring certificate-based authentication. More details   Rule IDsuspicious_kerberos_certificate_authentication Query{'selection': {'EventID': 4768}, 'condition': 'selection | count() by TargetUserName > 5', 'timeframe': '15m'} Log SourceStellar Cyber Windows Server Sensor configured for: 
 Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferencesSeverity50 Suppression Logic Based On
 Additional Information
 | 
