LoFP LoFP / t1222

t1222

TitleTags
admin changing file permissions.
administrative activity
administrator interacting with immutable files (e.g. for instance backups).
administrator or network operator can execute this command. please update the filter macros to remove false positives.
administrator or network operator can use this application for automation purposes. please update the filter macros to remove false positives.
administrators may use this command. filter as needed.
administrators or administrative scripts may use this application. filter as needed.
blob permissions may be modified by system administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
certain programs or applications may modify files or change ownership in writable directories. these can be exempted by username.
false positives will be present based on many factors. tune the correlation as needed to reduce too many triggers.
general usage of group policy will trigger this detection, also please not gpos modified using tools such as sharpgpoabuse will not generate the ad audit events which enable this detection.
if key credentials are regularly assigned to users, these events will need to be tuned out.
none.
scripts created by developers and admins
some applications and users may legitimately use attrib.exe to interact with the files.
storage bucket permissions may be modified by system administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
takeown.exe is a normal windows application that may used by network operator.
user interacting with files permissions (normal/daily behaviour).
when a gpo is manually edited and 5136 events are not logging to splunk.