Aug 07 2018 10:54 PM
Aug 07 2018 10:54 PM
We've starting rolling out EMS5 to our users, and have deployed the ATP Sensor on our dc's. The daily reports are working as expected but we have yet to see an alert. I've tried the FAQ trick of running nslookup againest the DC but no joy. Anyone got an ways to trigger an alert within AATP?
Oh AATP has been running for about 5 days.
Aug 08 2018 01:49 AM
The easiest way to generate an alert is to do DNS recon against the Domain Controller - which is protected by the AATP Sensor.
let me know if you require more information.
Aug 08 2018 03:21 AM
We have no errors in the workspace. I can see the senors are checking in..so i believe there is no communication issue. I can also see the reports are getting updated with current information.
I've tried a very basic nslooking recon process...with no joy. If you are able to provide a method that will trigger something happy to have a look at it.
Aug 08 2018 12:50 PM
I got a high priority alert after setting up AATP when I used this command: mstsc /v computername /remoteguard
My intention was to connect to another computer (where I have admin privileges) by remote desktop, but without exposing my credentials to that computer. AATP really got worried about me skating on my Kerberos ticket like that.
Aug 08 2018 01:04 PM
What happened? did it alert on Pass The Ticket claiming the ticket was stolen from your source computer to the remote host?
Aug 08 2018 01:07 PM
Aug 08 2018 01:09 PM
Thanks for letting me know, we will check if we can spot that as false positive...
(although technically you might say it's a benign true)
Aug 08 2018 10:14 PM - edited Aug 08 2018 10:17 PM
Hi Joe, John,
It is a FP/B-TP that is caused by remote credential guard.
Using remote credential guard the RDP client copies its original TGT to the RDP server so the user can use this TGT for requesting other TGS’s. The new TGS’s seems like PTT because their TGT parent created from the RDP client.
It is n our backlog to exclude this case and not trigger PTT.
Regarding the DNS recon - are you trying it against a DNS server which is on a DC that is covered by a Sensor?
Aug 27 2018 09:17 PM
Feb 05 2019 12:46 AM
Tried simulating the sensitive group alert but did not get any alert when adding users to domain admins etc... The actions are shown if searched the user from top right corner search bar but it does not alert in the timeline.
Why is that?
Feb 05 2019 01:14 AM
Hi @Mtee- ,
Suspicious modifications of sensitive groups requires learning period of 4 weeks per DC.
The detection relies on events audited on domain controllers. Make sure your domain controllers are auditing the events needed.
Do you see any data in the Modification to sensitive groups report?
Feb 05 2019 01:51 AM