Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
Identity Analytics |
Detector Tags |
Active Directory Certificate Services Analytics |
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
A Kerberos TGT was requested using PKINIT. This may indicate an attack on Active Directory Certificate Services (AD CS), such as shadow credential exploitation or certificate-based authentication abuse.
Attacker's Goals
Gain unauthorized access to high-privilege accounts by abusing certificate-based authentication mechanisms.
Investigative actions
- Verify if Windows Hello for Business (WHfB) is deployed and actively used in the environment, as it may explain the PKINIT activity.
- Inspect the Key Credentials attribute of the target account for recent modifications.
- Review associated service tickets or lateral movement activities tied to the target account.
- Investigate unusual certificate issuance or PKI activities.
Variations
Suspicious PKINIT TGT authentication requestAbnormal PKINIT TGT authentication request