LoFP LoFP / t1136.001

t1136.001

TitleTags
admin activity
administrative activity
administrator or network operator can execute this command. please update the filter macros to remove false positives.
administrators often leverage net.exe to create admin accounts.
better use event ids for user creation rather than command line rules.
domain controller logs
it is possible that an administrator created and deleted an account in a short time period. verifying activity with an administrator is advised.
it is possible that an administrator created the account. verifying activity with an administrator is advised. this analytic is set to anomaly to allow for risk to be added. filter and tune as needed. restrict to critical infrastructure to reduce any volume.
legitimate administration activities
legitimate user creation.
local accounts managed by privileged account management tools
the activity may be legitimate. for this reason, it's best to verify the account with an administrator and ask whether there was a valid service request for the account creation. if your local administrator group name is not \"administrators\", this search may generate an excessive number of false positives
unlikely
when remote authentication is in place, this should not change often