LoFP LoFP / t1136.001

t1136.001

TitleTags
a local user can be created for legitimate purposes. investigate the user details to determine if it is authorized.
admin activity
administrative activity
administrator or network operator can execute this command. please update the filter macros to remove false positives.
administrator or network operator can use this application for automation purposes. please update the filter macros to remove false positives.
administrators often leverage net.exe to create admin accounts.
an administrator account can be created for legitimate purposes. investigate the account details to determine if it is authorized.
better use event ids for user creation rather than command line rules.
domain controller logs
it is possible that an administrator created and deleted an account in a short time period. verifying activity with an administrator is advised.
it is possible that an administrator created the account. verifying activity with an administrator is advised. accounts created on domain controllers will trigger this too. exclude if it becomes too noisy. this analytic is set to anomaly to allow for risk to be added. filter and tune as needed. restrict to critical infrastructure to reduce any volume.
legitimate account creation occurs during employee onboarding, contractor provisioning, service account setup, or emergency access. verify against hr records and change management tickets. filter known admin accounts during business hours.
legitimate administration activities
legitimate administrators might create an \"esx admins\" group for valid reasons. verify that the group creation is authorized and part of normal administrative tasks. consider the context of the action, such as the user performing it and any related activities.
legitimate administrators might create, delete, or modify an \"esx admins\" group for valid reasons. verify that the group changes are authorized and part of normal administrative tasks. consider the context of the action, such as the user performing it and any related activities.
legitimate administrators might create, delete, or modify an a privileged group for valid reasons. verify that the group changes are authorized and part of normal administrative tasks. consider the context of the action, such as the user performing it and any related activities.
legitimate user creation
local accounts managed by privileged account management tools
new local accounts being created in esxi is rare in most environments. tune as needed.
the activity may be legitimate. for this reason, it's best to verify the account with an administrator and ask whether there was a valid service request for the account creation. if your local administrator group name is not \"administrators\", this search may generate an excessive number of false positives
unknown
unlikely
when remote authentication is in place, this should not change often