Rules Contributing to Steal or Forge Kerberos Tickets Alert

The following rules are used to identify suspicious activity to steal or forge kerberos tickets. Any one or more of these will trigger the Steal or Forge Kerberos Tickets Alert. Details for each rule can be viewed by clicking the More Details link in the description.

Title

Description

Register new Logon Process by Rubeus

Detects potential use of Rubeus via registered new trusted logon process

User Couldn't Call a Privileged Service 'LsaRegisterLogonProcess'

The 'LsaRegisterLogonProcess' function verifies that the application making the function call is a logon process by checking that it has the SeTcbPrivilege privilege set. Possible Rubeus tries to get a handle to LSA.

Suspicious Kerberos RC4 Ticket Encryption

Detects service ticket requests using RC4 encryption type