Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
Identity Analytics |
Detector Tags |
LDAP Analytics (Client), LDAP Analytics (Server), Active Directory Certificate Services Analytics |
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Low |
Description
A user sent a suspicious AD CS enumeration query via LDAP. The query is associated with an AD CS LDAP enumeration tool that may be used during attacks against the organization.
Attacker's Goals
An attacker is attempting to enumerate Active Directory.
Investigative actions
- Check if the process executes LDAP search queries as part of its normal behavior.
- Investigate the LDAP search query for any suspicious indicators.
- Determine whether the search query is generic. Wide search queries (often using wildcards) tend to be more suspicious. In our case, we are looking for targeted search queries.