Quantcast
Channel: THWACK: Message List - Security Event Manager (SEM) - Formerly Log & Event Manager
Viewing all articles
Browse latest Browse all 5385

Re: Alert on login attempts of disabled accounts

$
0
0

Okay, so in an effort to not put the answer on a platter...

 

I have a test domain and I have some disabled accounts.  I tried to mstsc from one server to another with a disabled account, and in LEM I see this:

 

2017-02-28 10_00_36-SolarWinds Log & Event Manager.png

 

Now, I have to admit that I'm not super familiar with this particular event, so I went to Randy Smith and asked what it meant.  I got this page:

 

Windows Security Log Event ID 4768 - A Kerberos authentication ticket (TGT) was requested

 

Now, if you look at the sample event, in the Extraneous Info field you can see a status code, "0x12" which I highlighted.  According to Randy, that means that the client account is:

 

0x12Clients credentials have been revokedAccount disabled, expired, locked out, logon hours.

 

So, good news!  You don't need a special AD group, because you can run the correlation off any account that is disabled, regardless of group membership!

 

Therefore, I'd say you'd want to start with a correlation for UserAuthTicket events (that's the event type that I got) and look in the ExtraneousInfo field for that 0x12 string, and maybe look for a ProviderSID of Microsoft-Windows-Security 4768.

 

Let me know if you want more than that to help you on your way!


Viewing all articles
Browse latest Browse all 5385

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>