Interactive login by a service account

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Identity Analytics

Detector Tags

ATT&CK Tactic

Initial Access (TA0001)

ATT&CK Technique

Valid Accounts: Domain Accounts (T1078.002)

Severity

Low

Description

A service account performed an interactive or remote interactive login.

Attacker's Goals

Use an account that has access to resources to move laterally in the network and access privileged resources.

Investigative actions

  • See whether the login was successful.
  • Check whether the account has done any administrative actions it should not usually do.
  • Look for more logins and authentications by the account throughout the network.

Variations

Interactive login by a service account to a sensitive server

Synopsis

ATT&CK Tactic

Initial Access (TA0001)

ATT&CK Technique

Valid Accounts: Domain Accounts (T1078.002)

Severity

Medium

Description

Interactive login by a service account to a sensitive server.

Attacker's Goals

Use an account that has access to resources to move laterally in the network and access privileged resources.

Investigative actions

  • See whether the login was successful.
  • Check whether the account has done any administrative actions it should not usually do.
  • Look for more logins and authentications by the account throughout the network.


Failed interactive login by a service account

Synopsis

ATT&CK Tactic

Initial Access (TA0001)

ATT&CK Technique

Valid Accounts: Domain Accounts (T1078.002)

Severity

Informational

Description

A service account performed an interactive or remote interactive login.

Attacker's Goals

Use an account that has access to resources to move laterally in the network and access privileged resources.

Investigative actions

  • See whether the login was successful.
  • Check whether the account has done any administrative actions it should not usually do.
  • Look for more logins and authentications by the account throughout the network.