LoFP LoFP / t1136

t1136

TitleTags
a group may be created by a system or network administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment. group creations by unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
admin activity
administrative activity
an rds security group may be created by a system or network administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment. security group creations by unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
as is common with many fraud-related searches, we are usually looking to attribute risk or synthesize relevant context with loosely written detections that simply detect anamolous behavior. this search will need to be customized to fit your environment—improving its fidelity by counting based on something much more specific, such as a device id that may be present in your dataset. consideration for whether the large number of registrations are occuring from a first-time seen domain may also be important. extending the search window to look further back in time, or even calculating the average per hour/day for each email domain to look for an anomalous spikes, will improve this search. you can also use shannon entropy or levenshtein distance (both courtesy of url toolbox) to consider the randomness or similarity of the email name or email domain, as the names are often machine-generated.
assumed roles may be used by legitimate automated systems to create iam users for specific workflows. verify if this event aligns with known automation activities. if the action is routine for specific roles or user agents (e.g., `aws-cli`, `boto3`), consider adding those roles or user agents to a monitored exception list for streamlined review.
better use event ids for user creation rather than command line rules.
domain controller logs
if the behavior of creating okta api tokens is expected, consider adding exceptions to this rule to filter false positives.
legitimate administration activities
legitimate administrative script
legitimate local user creations may be done by a system or network administrator. verify whether this is known behavior in your environment. local user creations by unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
legitimate user creation.
local accounts managed by privileged account management tools
organization approved new members
service accounts can be created by system administrators. verify that the behavior was expected. exceptions can be added to this rule to filter expected behavior.
unlikely
when remote authentication is in place, this should not change often