Sensitive groups

%3CLINGO-SUB%20id%3D%22lingo-sub-149140%22%20slang%3D%22en-US%22%3ESensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-149140%22%20slang%3D%22en-US%22%3E%3CP%3EHas%20anyone%20managed%20to%20get%20anything%20meaningful%20from%20Sensitive%20Groups%20%3F%26nbsp%3B%20I%20thought%20the%20intent%20was%20to%20%22monitor%22%20those%20groups%20for%20membership%20changes.%26nbsp%3B%20I%20have%20pushed%20and%20pulled%20users%20in%20and%20out%20of%20groups%20(say%2C%20Domain%20Admins)%20and%20I%20never%20get%20notified%20of%20anything%20!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-164840%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-164840%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20report%20works%20fine%20and%20Stuart%20got%20a%20report%20with%20attached%20file%20few%20days%20ago.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFew%20things%20to%20clarify%20regarding%20the%20detector%20(i.e.%2C%20when%20the%20Security%20Alert%20will%20be%20triggered%20and%20will%20be%20seen%20in%20the%20Timeline)%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EThere%20is%20a%20learning%20period%20of%204%20weeks%20on%20each%20DC%2C%20starting%20from%20the%20first%20group%20membership%20change%20(add)%20event.%3C%2FLI%3E%0A%3CLI%3EThe%20admin%20didn%E2%80%99t%20make%20any%20change%20to%20any%20group%20on%20any%20DC%20during%20the%20last%2010%20weeks.%3C%2FLI%3E%0A%3CLI%3EOnly%20on%20adding%20members%20to%20a%20group%20(events%204728%2C%204732%2C%204756).%3C%2FLI%3E%0A%3CLI%3EOnly%20on%20sensitive%20group%20changes.%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-164631%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-164631%22%20slang%3D%22en-US%22%3E%3CP%3EIn%20the%20Azure%20ATP%20console%20can%20you%20see%20the%20changes%20in%20the%20entity%20profile(s)%20of%20the%20objects%20in%20questions%3F%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F29179i1E335E11DE31450B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22group%20change%20modifications.jpg%22%20title%3D%22group%20change%20modifications.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-162444%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-162444%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Stuart%2C%3CBR%20%2F%3E%3CSTRONG%3ECan%20you%20make%20sure%20that%20the%20Group%20Events%20are%20logged%3F%3C%2FSTRONG%3E%3CBR%20%2F%3ETo%20turn%20them%20on%2C%20please%20do%20the%20following%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EOn%20the%20DC%2C%26nbsp%3B%20open%20gpme.msc.%3C%2FLI%3E%0A%3CLI%3ENavigate%20to%20%3A%20Domain%20Controllers.%3CDOMAIN%20name%3D%22%22%3E%20--%26gt%3B%20Default%20Domain%20Controllers%20Policy.%3C%2FDOMAIN%3E%3C%2FLI%3E%0A%3CLI%3EIn%20that%20policy%2C%20navigate%20to%20the%20following%20path%20to%20configure%20the%20DC%20for%20those%20event%20auditing%3A%3C%2FLI%3E%0A%3CLI%3EComputer%20Configuration%20--%26gt%3B%20Policies%20--%26gt%3B%20Windows%20Settings%20--%26gt%3B%20Security%20Settings%20--%26gt%3B%20Local%20Policies%20--%26gt%3B%20Audit%20Policy%3C%2FLI%3E%0A%3CLI%3ESet%20the%20following%20values%20to%20%22Success%2CFailure%22%20%3A%20%3CBR%20%2F%3E%2B%20Audit%20Account%20logon%20events%20%3CBR%20%2F%3E%2B%20Audit%20account%20management%20%3CBR%20%2F%3E%2B%20Audit%20directory%20service%20access%20%3CBR%20%2F%3E%2B%20Audit%20logon%20events%3C%2FLI%3E%0A%3CLI%3Egpupdate.%26nbsp%3B%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EAfter%20that%2C%20please%20do%20the%20group%20changes%20in%20the%20AD.%20You%20can%20make%20sure%20the%20events%20are%20created%20by%20opening%20the%20Event%20Viewer%20(Windows%20Logs%20-%26gt%3B%20Security)%3C%2FP%3E%0A%3CP%3EFinally%2C%20try%20to%20download%20the%20report.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20it%20won't%20work%2C%20please%20PM%20me%20your%20workspace%20ID%20(and%20name)%20and%20the%20time%20range%20(UTC)%20of%20the%20group%20members%20change.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%2C%3C%2FP%3E%0A%3CP%3EGal%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-162073%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-162073%22%20slang%3D%22en-US%22%3E%3CP%3EDid%20this%20make%20it%20in%2C%20as%20it%20does%20not%20seem%20to%20be%20working%20%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERepro%3A%3C%2FP%3E%0A%3CP%3EAdd%20group%20to%20entity%20list%3C%2FP%3E%0A%3CP%3ESchedule%20a%20report%20for%20sensitive%20groups(daily)%3C%2FP%3E%0A%3CP%3Ewait%20a%20few%20hours%3C%2FP%3E%0A%3CP%3Eadd%20some%20random%20user%20to%20group%3C%2FP%3E%0A%3CP%3Eawait%20next%20daily%26nbsp%3Breport%20to%20show%20said%20user%20was%20added%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIs%20my%20expectation%20correct%20%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-157431%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-157431%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Stuart%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe've%20reviewed%20the%20sensitive%20groups%20report%20and%20I'm%20pleased%20to%20let%20you%20know%20that%20all%20changes%20to%20the%20sensitive%20groups%20will%20now%20be%20included%20in%20the%20report%20(not%20just%20the%20anomalies).%20We%20expect%20to%20release%20the%20code%20to%20enable%20this%20in%20our%20next%20update%20cycle%20on%20Sunday%20February%2018th.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-149663%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-149663%22%20slang%3D%22en-US%22%3E%3CP%3EYes%20and%20No.%3C%2FP%3E%0A%3CP%3EUnlike%20ATA%20which%20can%20alert%20for%20abnormal%20modifications%2C%20and%20report%20on%20all%20modifications%2C%3C%2FP%3E%0A%3CP%3EAATP%20(for%20now)%20can%26nbsp%3B%3CSPAN%3Ealert%20for%20abnormal%20modifications%20too%20(with%20the%20same%2010%20weeks%20learning%20period)%2C%20but%20it's%20report%20will%20only%20report%20on%20previously%20alerted%20modifications%2C%20and%20not%20all%20of%20them%20like%20in%20ATA.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ESo..%20if%20you%20wait%202%20more%20weeks%2C%20and%20use%20an%20account%20that%20did%20not%20modify%20the%20tagged%20group%20during%20the%20learning%20period%2C%20you%20should%20see%20an%20alert...%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-149662%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-149662%22%20slang%3D%22en-US%22%3E%3CP%3E10%20weeks%20of%20learning%2C%20for%20what%20exactly%20%3F%26nbsp%3BTo%20say%20that%20someone%20%22unusual%22%20has%20modified%20the%20group%20membership%20%3F%20If%20this%20is%2010%20weeks%20to%20appear%20in%20the%20report%2C%20is%20pretty%20useless%2C%20don't%20you%20think%20%3F%26nbsp%3B%20What%20would%20be%20the%20point%20of%20that%20%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-149661%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-149661%22%20slang%3D%22en-US%22%3E%3CP%3ESorry%2C%20got%20confused%20with%20another%20thread.%3C%2FP%3E%0A%3CP%3Ein%20AATP%2C%20you%20can%20tag%20the%20entities%2C%20so%20it%20seems%20you%20gap%20is%20that%20you%20need%20to%20have%20at%20least%2010%20weeks%20of%20learning%20period.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-149658%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-149658%22%20slang%3D%22en-US%22%3E%3F%3F%20But%20we%20are%20talking%20ATP%20here%2C%20not%20ATA.%20There%20is%20already%20a%20list%20of%20sensitive%20groups%20that%20you%20can%20choose%20to%20%22monitor%22%2C%20and%20whilst%20I%20have%20added%20things%20like%20Domain%20Admins%20and%20Enterprise%20Admins%20(which%20get%20changed%20very%20infrequently)%2C%20I%20added%20a%20test%20group%20so%20we%20could%20see%20that%20the%20report%20and%20behaviour%20was%20like.%20Whilst%20I%20have%20not%20tried%20removing%20or%20adding%20folks%20to%20DA%20and%20EA%20(our%20auditors%20would%20not%20be%20happy%20with%20that%2C%20and%20I%20am%20not%20about%20to%20raise%20a%20change%20record%20just%20for%20that)%2C%20it%20should%20certainly%20evaluate%20the%20group%20I%20have%20added%2C%20surely%20%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-149621%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-149621%22%20slang%3D%22en-US%22%3E%3CP%3EWhich%20domain%20group%20was%20it%3F%3C%2FP%3E%0A%3CP%3EKeep%20in%20mind%20that%20in%201.8.*%20we%20are%20using%20a%20closed%20list%20of%20groups%20defined%20as%20sensitive.%3C%2FP%3E%0A%3CP%3Ein%20future%20version%20you%20will%20be%20able%20to%20tag%20yourself%20which%20groups%20are%20sensitive%20for%20you.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-149596%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-149596%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20group%20in%20question%20(as%20a%20test)%20was%20not%20one%20that%20normally%20gets%20modified%20at%20all....in%20fact%20it%20has%20probably%20not%20been%20modified%20for%2012%20months%2C%20by%20anyone%20previously.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYes%2C%20was%20aware%20of%20the%20report.....and%20there%20is%20NOTHING%20at%20all%20in%20the%20report%2C%20which%20actually%20would%20be%20more%20useful%20to%20me%20than%20a%20console%20alert.%26nbsp%3B%20Why%20would%20it%20not%20show%20in%20the%20report%20%3F%26nbsp%3B%20Yes%2C%20auditing%20for%20group%20membership%20is%20nabbed%2C%20and%20yes%2C%20it%20shows%20on%20the%20event%20log.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-149576%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-149576%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Stuart%2C%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThere%20is%20a%20report%20that%20will%20show%20you%20all%20of%20the%20sensitive%20group%20modifications.%20Can%20you%20run%20this%20report%20and%20see%20if%20it%20has%20the%20modifications%20you%20did%20recently%3F%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%3C%2FP%3E%0A%3CP%3EGershon%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-149555%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-149555%22%20slang%3D%22en-US%22%3E%3CP%3EGenerally%20yes%2C%3C%2FP%3E%0A%3CP%3Ewait%20for%202-3%20more%20weeks%2C%20then%20to%20invoke%20the%20alert%2C%20try%20to%20modify%20a%20sensitive%20group%20using%20an%20account%20that%20does%20not%20normally%20do%20it...%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-149433%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-149433%22%20slang%3D%22en-US%22%3E%3CP%3EAt%20least%208%20weeks.%20What%20actually%20is%20the%20detector%20learning%20%3F%26nbsp%3B%20%22Normal%22%20modifications%20by%20%3CEM%3Eexpected%3C%2FEM%3Eadmins%20or%20other%20sensitive%20users%20%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-149409%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-149409%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20detector%20needs%20a%26nbsp%3B%20learning%20period%20before%20it%20is%20active.%3C%2FP%3E%0A%3CP%3EHow%20long%20is%20the%20system%20deployed%20with%20this%20version%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1512963%22%20slang%3D%22en-US%22%3ERe%3A%20Sensitive%20groups%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1512963%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F121221%22%20target%3D%22_blank%22%3E%40Gal%20Bruchim%3C%2FA%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F106935%22%20target%3D%22_blank%22%3E%40Eli%20Ofek%3C%2FA%3E%26nbsp%3BI'm%20in%20a%20similar%20situation%20so%20I%20have%20some%20questions%20to%20clarify%20me%20the%20detector%20behaviour%3A%3C%2FP%3E%3CP%3E-%20if%20the%20group%20(i.e.%20Domain%20Admins)%20is%20modified%20%3CU%3Ealways%20by%20the%20same%20account%3C%2FU%3E%20no%20alert%20is%20triggered%2C%20if%20another%20user%20modify%20the%20group%20membership%20I%20receive%20the%20alert.%20Is%20this%20correct%3F%3C%2FP%3E%3CP%3E-%20The%20learning%20period%20(4%20weeks)%20starts%26nbsp%3B%3CSPAN%3Efrom%20the%20first%20group%20membership%20change%20(add)%20event%20after%20the%20sensor%20installation.%20Is%20this%20correct%3F%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3E-%20could%20you%20explain%20me%20better%20%22%3C%2FSPAN%3EThe%20admin%20didn%E2%80%99t%20make%20any%20change%20to%20any%20group%20on%20any%20DC%20during%20the%20last%2010%20weeks.%22%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%20a%20lot%3C%2FP%3E%3CP%3EMike%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
Occasional Contributor

Has anyone managed to get anything meaningful from Sensitive Groups ?  I thought the intent was to "monitor" those groups for membership changes.  I have pushed and pulled users in and out of groups (say, Domain Admins) and I never get notified of anything !

16 Replies
Highlighted

This detector needs a  learning period before it is active.

How long is the system deployed with this version?

 

Highlighted

At least 8 weeks. What actually is the detector learning ?  "Normal" modifications by expected admins or other sensitive users ?

Highlighted

Generally yes,

wait for 2-3 more weeks, then to invoke the alert, try to modify a sensitive group using an account that does not normally do it...

Highlighted

Hi Stuart, 

 

There is a report that will show you all of the sensitive group modifications. Can you run this report and see if it has the modifications you did recently? 

 

Thanks

Gershon

Highlighted

The group in question (as a test) was not one that normally gets modified at all....in fact it has probably not been modified for 12 months, by anyone previously.

 

Yes, was aware of the report.....and there is NOTHING at all in the report, which actually would be more useful to me than a console alert.  Why would it not show in the report ?  Yes, auditing for group membership is nabbed, and yes, it shows on the event log.

Highlighted

Which domain group was it?

Keep in mind that in 1.8.* we are using a closed list of groups defined as sensitive.

in future version you will be able to tag yourself which groups are sensitive for you.

Highlighted
?? But we are talking ATP here, not ATA. There is already a list of sensitive groups that you can choose to "monitor", and whilst I have added things like Domain Admins and Enterprise Admins (which get changed very infrequently), I added a test group so we could see that the report and behaviour was like. Whilst I have not tried removing or adding folks to DA and EA (our auditors would not be happy with that, and I am not about to raise a change record just for that), it should certainly evaluate the group I have added, surely ?
Highlighted

Sorry, got confused with another thread.

in AATP, you can tag the entities, so it seems you gap is that you need to have at least 10 weeks of learning period.

Highlighted

10 weeks of learning, for what exactly ? To say that someone "unusual" has modified the group membership ? If this is 10 weeks to appear in the report, is pretty useless, don't you think ?  What would be the point of that ?

Highlighted

Yes and No.

Unlike ATA which can alert for abnormal modifications, and report on all modifications,

AATP (for now) can alert for abnormal modifications too (with the same 10 weeks learning period), but it's report will only report on previously alerted modifications, and not all of them like in ATA.

So.. if you wait 2 more weeks, and use an account that did not modify the tagged group during the learning period, you should see an alert...

Highlighted

Hi Stuart,

 

We've reviewed the sensitive groups report and I'm pleased to let you know that all changes to the sensitive groups will now be included in the report (not just the anomalies). We expect to release the code to enable this in our next update cycle on Sunday February 18th.

Highlighted

Did this make it in, as it does not seem to be working ?

 

Repro:

Add group to entity list

Schedule a report for sensitive groups(daily)

wait a few hours

add some random user to group

await next daily report to show said user was added

 

Is my expectation correct ?

Highlighted

Hi Stuart,
Can you make sure that the Group Events are logged?
To turn them on, please do the following:

  1. On the DC,  open gpme.msc.
  2. Navigate to : Domain Controllers.<domain name> --> Default Domain Controllers Policy.
  3. In that policy, navigate to the following path to configure the DC for those event auditing:
  4. Computer Configuration --> Policies --> Windows Settings --> Security Settings --> Local Policies --> Audit Policy
  5. Set the following values to "Success,Failure" :
    + Audit Account logon events
    + Audit account management
    + Audit directory service access
    + Audit logon events
  6. gpupdate. 

After that, please do the group changes in the AD. You can make sure the events are created by opening the Event Viewer (Windows Logs -> Security)

Finally, try to download the report.

 

If it won't work, please PM me your workspace ID (and name) and the time range (UTC) of the group members change.

 

Thanks,

Gal

 

Highlighted

In the Azure ATP console can you see the changes in the entity profile(s) of the objects in questions? 

 

group change modifications.jpg

Highlighted

The report works fine and Stuart got a report with attached file few days ago.

 

Few things to clarify regarding the detector (i.e., when the Security Alert will be triggered and will be seen in the Timeline):

  • There is a learning period of 4 weeks on each DC, starting from the first group membership change (add) event.
  • The admin didn’t make any change to any group on any DC during the last 10 weeks.
  • Only on adding members to a group (events 4728, 4732, 4756).
  • Only on sensitive group changes.
Highlighted

@Gal Bruchim @Eli Ofek I'm in a similar situation so I have some questions to clarify me the detector behaviour:

- if the group (i.e. Domain Admins) is modified always by the same account no alert is triggered, if another user modify the group membership I receive the alert. Is this correct?

- The learning period (4 weeks) starts from the first group membership change (add) event after the sensor installation. Is this correct?

- could you explain me better "The admin didn’t make any change to any group on any DC during the last 10 weeks."?

 

Thanks a lot

Mike