Difference between revisions of "HIDS 59227"
m (→Logon types) |
m (→What you should do) |
||
Line 46: | Line 46: | ||
== What you should do == | == What you should do == | ||
− | + | If this is authorized behavior, update the users account configuration to allow this logon type. If this is not expected or authorized behavior, this may indicate an attack, and the source should be investigated. Check the GUI for other events from the sources IP. | |
− | The platform will track this logon, and if multiple events occur will issue a higher level alert that a brute force attack may be occurring. | + | The platform will track this logon, and if multiple events occur will issue a higher level alert that a brute force attack may be occurring. |
= Troubleshooting = | = Troubleshooting = |
Revision as of 16:59, 20 October 2020
Rule 59222 | |
---|---|
Status | Active |
Alert Message | Logon Failure - User not granted logon type |
Contents |
Description
Windows has detected that a system has attempted to log an account where they have not been granted the logon type.
Associated Windows Event IDs
- 529
- 530
- 531
- 532
- 533
- 534
- 535
- 536
- 537
- 539
- 4625
Logon types
1 – Interactive Console Logons
2– Network - This logon happens when you’re accessing file shares using SMB for example.
3– Batch - This is used for scheduled tasks.
4– Service - This is used for services and service accounts that log on to start a service.
5– Unlock - This is used whenever a user unlocks their machine.
6– Network Cleartext - This is used when logging on over the network - when the password is sent in clear text (should happen to you!)
7– New Credentials - This is used when you run an application using the RunAs command.
8– Remote Interactive - This is used for the RDP applications like Terminal Services or Remote Assistance.
9– Cached Interactive - This is logged when users log on using cached credentials.
What you should do
If this is authorized behavior, update the users account configuration to allow this logon type. If this is not expected or authorized behavior, this may indicate an attack, and the source should be investigated. Check the GUI for other events from the sources IP.
The platform will track this logon, and if multiple events occur will issue a higher level alert that a brute force attack may be occurring.
Troubleshooting
False Positives
There are no false positives with this rule.
Tuning Guidance
There is no guidance for tuning this rule, this is a generic Windows error and the rule should not be disabled.
Additional Information
Support
If you are unsure about how to respond to this alert, please contact Atomicorp support. We're here to help you!
Similar Rules
HIDS_59222 Windows: Remote Logon Failure - Unknown user or bad password
HIDS_59223 Logon Failure - Account logon time restriction violation
HIDS_59224 Logon Failure - Account currently disabled
HIDS_59225 Logon Failure - Specified account expired
HIDS_59226 Logon Failure - User not allowed to login at this computer
HIDS_59228 Logon Failure - Account's password expired
HIDS_59229 Logon Failure - Internal error
HIDS_59230 Logon Failure - Account locked out
Knowledge Base Articles
None.
Outside References
None.