Windows anomalous user name

Goal

Detects users that are rarely or unusually active compared to other users, using a rare function that detest values that occur rarely on time or rarely for a population.

Description

Searches for activity from users who are not normally active, which can indicate unauthorised changes, activity by unauthorised users, lateral movement, and compromised credentials.

In organisations, new usernames are not often created apart from specific types of system activities, such as creating new accounts for new employees. These user accounts quickly become active and routine.

Events from rarely used usernames can point to suspicious activity.

Additionally, automated Linux fleets tend to see activity from rarely used usernames only when personnel log in to make authorised or unauthorised changes, or threat actors have acquired credentials and log in for malicious purposes. Unusual usernames can also indicate pivoting, where compromised credentials are used to try and move laterally from one host to another.

Characteristics

Name
Windows anomalous user name

Type

Windows

Data source

AD logs or Windows Threat Hunting

Required fields

hostName

processName

userName

action

Last updated