Unauthorised Access & Privilege Escalation Investigation Runbook

SOC & DFIR Operations Guide

Environment: Windows AD | Microsoft 365 | Defender XDR | Sentinel | Entra ID | Palo Alto Prisma Access


Overview & Scope

This runbook provides standardised procedures for investigating unauthorised access attempts and privilege escalation attacks across the hybrid enterprise environment. It covers detection, investigation, containment, and remediation workflows for both on-premises Active Directory and cloud identity platforms.

Attack Categories

Unauthorised Access Types

Type
Description
Examples

Credential-Based

Using stolen/compromised credentials

Phishing, credential stuffing, password spray

Session Hijacking

Taking over active sessions

Token theft, cookie hijacking, session replay

Authentication Bypass

Circumventing authentication controls

MFA bypass, legacy protocol abuse, CA policy gaps

Access Control Abuse

Exploiting misconfigurations

Overprivileged accounts, broken access control

Insider Threat

Authorized users exceeding permissions

Data theft, unauthorized system access

Privilege Escalation Types

Type
Description
Target

Local Privilege Escalation

User → Admin on single system

Endpoints, servers

Domain Privilege Escalation

User → Domain Admin

Active Directory

Cloud Privilege Escalation

User → Global Admin

Entra ID, M365

Horizontal Escalation

Access to peer accounts/resources

Lateral movement

Vertical Escalation

Lower → Higher privilege level

Elevation of privilege

Common Attack Techniques

On-Premises AD Privilege Escalation

Technique
Description
Risk Level

Kerberoasting

Crack service account passwords via TGS

High

AS-REP Roasting

Crack passwords for accounts without pre-auth

High

DCSync

Replicate password hashes from DC

Critical

Golden Ticket

Forge TGT with KRBTGT hash

Critical

Silver Ticket

Forge TGS for specific services

High

AdminSDHolder Abuse

Modify protected groups ACLs

Critical

GPO Abuse

Modify Group Policy for persistence/escalation

Critical

DACL/ACL Abuse

Exploit misconfigured object permissions

High

Unconstrained Delegation

Capture TGTs from connecting users

Critical

Constrained Delegation Abuse

Impersonate users to specific services

High

Resource-Based Constrained Delegation

Modify delegation settings

High

Print Spooler Abuse

PrintNightmare, SpoolSample

High

Certificate Template Abuse

AD CS misconfigurations

Critical

Shadow Credentials

Add key credentials to user objects

High

LAPS Abuse

Access local admin passwords

High

Cloud Privilege Escalation

Technique
Description
Risk Level

Entra ID Role Assignment

Add user to privileged roles

Critical

PIM Abuse

Activate/exploit privileged roles

Critical

OAuth Consent Grant

Gain app permissions via consent

High

Application Impersonation

Use app permissions to access data

High

Service Principal Abuse

Exploit app registration permissions

High

Conditional Access Bypass

Circumvent CA policies

High

Cross-Tenant Access

Abuse B2B/B2C configurations

High

Administrative Unit Abuse

Escape AU restrictions

Medium

Local Privilege Escalation

Technique
Description
Risk Level

Token Manipulation

Impersonate privileged tokens

High

UAC Bypass

Circumvent User Account Control

Medium

DLL Hijacking

Load malicious DLLs in privileged context

High

Service Exploitation

Abuse misconfigured services

High

Scheduled Task Abuse

Create/modify tasks for elevation

Medium

Unquoted Service Paths

Exploit path parsing vulnerabilities

Medium

AlwaysInstallElevated

MSI installation with SYSTEM privileges

High

Kernel Exploits

Exploit OS vulnerabilities

Critical

Named Pipe Impersonation

Impersonate connecting clients

High


Detection Sources & Data Mapping

Log Sources Matrix

Platform
Log Table
Key Data

On-Prem AD

SecurityEvent

Privileged logons, group changes, ACL modifications

Defender for Identity

IdentityDirectoryEvents

AD object changes, reconnaissance

Defender for Identity

IdentityLogonEvents

Authentication events, anomalies

Defender for Identity

IdentityQueryEvents

LDAP queries, enumeration

Defender for Endpoint

DeviceEvents

Token manipulation, UAC bypass

Defender for Endpoint

DeviceProcessEvents

Privilege escalation tools

Defender for Endpoint

DeviceLogonEvents

Local/remote logons

Entra ID

AuditLogs

Role assignments, PIM activations

Entra ID

SigninLogs

Privileged account access

Cloud Apps

CloudAppEvents

OAuth grants, app permissions

Sentinel

AzureActivity

Azure RBAC changes

Sentinel

SecurityAlert

Correlated privilege alerts

Critical Windows Event IDs

Authentication & Access

Event ID
Description
Investigation Relevance

4624

Successful logon

Track privileged access patterns

4625

Failed logon

Brute force, unauthorized access attempts

4648

Explicit credential logon

Credential usage, lateral movement

4672

Special privileges assigned

Admin/privileged logon detection

4768

Kerberos TGT requested

Initial authentication, AS-REP roasting

4769

Kerberos TGS requested

Kerberoasting, service access

4771

Kerberos pre-auth failed

Password attacks

4776

NTLM authentication

Legacy auth, Pass-the-Hash

Privilege Changes

Event ID
Description
Investigation Relevance

4728

Member added to security group

Privilege escalation

4729

Member removed from security group

Access revocation, cover-up

4732

Member added to local group

Local privilege escalation

4733

Member removed from local group

Access changes

4756

Member added to universal group

Enterprise-wide access

4757

Member removed from universal group

Access changes

Object & Policy Changes

Event ID
Description
Investigation Relevance

4662

Object access operation

DCSync detection, AD object access

4663

Object access attempted

File/folder access

4670

Permissions changed on object

ACL modification

4713

Kerberos policy changed

Security policy tampering

4719

System audit policy changed

Audit evasion

4739

Domain policy changed

Domain-wide changes

4780

ACL set on admin accounts

AdminSDHolder modification

5136

Directory object modified

AD attribute changes

5137

Directory object created

New AD objects

5141

Directory object deleted

AD object removal

Service & Scheduled Task

Event ID
Description
Investigation Relevance

4697

Service installed

Persistence, privilege escalation

4698

Scheduled task created

Persistence mechanism

4699

Scheduled task deleted

Cover-up activity

4700

Scheduled task enabled

Activation of persistence

4702

Scheduled task updated

Modification of tasks


Investigation Workflows

Unauthorised Access Investigation

Objective: Determine if access was unauthorised, identify the access method, assess impact, and remediate.

Step 1: Initial Triage

  1. Review the alert source and detection logic

  2. Identify the account and resource accessed

  3. Verify if access was expected/authorised

  4. Check account type: user, service, admin, guest

  5. Determine time of access vs. normal working hours

Step 2: Access Pattern Analysis

  1. Query SigninLogs/SecurityEvent for account history

  2. Compare current access to baseline behaviour

  3. Check source IP, location, and device

  4. Review authentication method used

  5. Identify any Conditional Access policy bypasses

Step 3: Session Analysis

  1. Determine session duration and activity

  2. Query all resources accessed during session

  3. Check for data access, downloads, or modifications

  4. Review email activity if applicable

  5. Examine file access patterns

Step 4: Authorisation Verification

  1. Confirm account's authorised access level

  2. Check group memberships and role assignments

  3. Verify if access was within scope of permissions

  4. Review any recent permission changes

  5. Contact account owner if needed for verification

Step 5: Impact Assessment

  1. Document all resources accessed

  2. Identify sensitive data exposure

  3. Check for data exfiltration indicators

  4. Assess potential for lateral movement

  5. Determine business impact


Domain Privilege Escalation Investigation

Objective: Detect and investigate attempts to gain elevated privileges within Active Directory.

Step 1: Identify Escalation Vector

  1. Review MDI alerts for known attack patterns

  2. Check for Kerberoasting/AS-REP Roasting indicators

  3. Look for DCSync or replication anomalies

  4. Review sensitive group membership changes

  5. Check for delegation abuse

Step 2: Sensitive Group Monitoring

Critical Groups to Monitor:

Group
Risk
Detection Focus

Domain Admins

Critical

Any membership change

Enterprise Admins

Critical

Any membership change

Schema Admins

Critical

Any membership change

Administrators

Critical

Non-standard additions

Account Operators

High

Can create/modify accounts

Backup Operators

High

Can access any file

Server Operators

High

Can logon to DCs

Print Operators

High

Can load drivers on DCs

DnsAdmins

High

Can execute code on DCs

Group Policy Creator Owners

High

Can create GPOs

Step 3: DCSync Detection

  1. Query for Directory Replication Service Access

  2. Check 4662 events for replication GUIDs

  3. Verify source is a legitimate domain controller

  4. Review MDI alerts for DCSync detection

  5. Check for DRSUAPI calls from non-DCs

Step 4: Kerberos Attack Detection

  1. Review 4769 events for RC4 encryption (0x17)

  2. Check for bulk TGS requests from single user

  3. Look for AS-REQ without pre-auth (4768)

  4. Monitor for ticket anomalies via MDI

  5. Check for golden/silver ticket indicators

Step 5: GPO Abuse Detection

  1. Query for GPO creation/modification events

  2. Check for GPO links to sensitive OUs

  3. Review script deployment via GPO

  4. Look for scheduled task deployment

  5. Monitor for software installation changes


Cloud Privilege Escalation Investigation

Objective: Detect and investigate privilege escalation within Entra ID and Microsoft 365.

Step 1: Role Assignment Analysis

  1. Query AuditLogs for role assignment events

  2. Identify who assigned the role and when

  3. Verify the assignment was authorised

  4. Check if proper approval workflow was followed

  5. Review the user's other role assignments

Step 2: PIM Activity Review

  1. Query for PIM role activations

  2. Check justification provided for activation

  3. Verify approval if required

  4. Review activation duration

  5. Analyse activity during activation period

  1. Query for OAuth consent grant events

  2. Identify permissions granted

  3. Check if admin consent was required/given

  4. Review the application's reputation

  5. Assess risk of granted permissions

Step 4: Service Principal Investigation

  1. Review service principal permission changes

  2. Check for credential/secret additions

  3. Identify API permissions granted

  4. Review owner assignments

  5. Check for federation configurations

Step 5: Conditional Access Bypass

  1. Review sign-ins that bypassed CA policies

  2. Identify policy gaps or exclusions

  3. Check for legacy authentication usage

  4. Review named locations and trusted IPs

  5. Assess device compliance bypasses


Local Privilege Escalation Investigation

Objective: Detect and investigate attempts to gain SYSTEM or admin privileges on endpoints.

Step 1: Process Analysis

  1. Review DeviceProcessEvents for suspicious activity

  2. Check for known escalation tools (mimikatz, etc.)

  3. Analyse parent-child process relationships

  4. Look for unusual SYSTEM process creation

  5. Check for token manipulation indicators

Step 2: Service Exploitation Detection

  1. Review service creation/modification events

  2. Check for unquoted service paths

  3. Look for writable service binaries

  4. Review service account permissions

  5. Check for DLL hijacking opportunities

Step 3: Scheduled Task Analysis

  1. Query for task creation by non-admin users

  2. Check for SYSTEM-level task execution

  3. Review task actions and triggers

  4. Look for suspicious task paths

  5. Check for legacy AT jobs

Step 4: Exploit Indicators

  1. Review MDE alerts for exploit detection

  2. Check for kernel exploit indicators

  3. Look for UAC bypass patterns

  4. Review memory injection alerts

  5. Check for driver loading anomalies


KQL Query Cheat Sheet

Privileged Account Monitoring

Privileged Logon Activity

Special Privileges Assigned (4672)

First-Time Privileged Access


Sensitive Group Changes

Domain Admin Group Modifications

Entra ID Role Assignments

PIM Role Activations


Kerberos Attack Detection

Kerberoasting Detection

AS-REP Roasting Detection

Golden Ticket Indicators

Silver Ticket / Service Ticket Anomalies


DCSync & Replication Attacks

DCSync Detection

Defender for Identity - DCSync


ACL & Permission Abuse

AdminSDHolder Modification

Object Permission Changes

Delegation Configuration Changes


Local Privilege Escalation

Token Manipulation Detection

Suspicious Service Installation

UAC Bypass Detection

Scheduled Task Privilege Escalation


OAuth & Application Abuse

Application Permission Changes

Service Principal Credential Addition


Conditional Access & Access Policy

Conditional Access Policy Changes

Sign-ins Bypassing Conditional Access

Legacy Authentication Usage


Lateral Movement Detection

Unusual Lateral Movement Patterns

Pass-the-Hash / Pass-the-Ticket


Response Actions & Remediation

Immediate Containment Actions

Scenario
Action
Method

Compromised Privileged Account

Disable account

AD + Entra ID disable

Active Privilege Escalation

Isolate affected systems

MDE device isolation

DCSync Detected

Block source IP, disable account

Firewall + AD disable

Rogue Admin Account

Disable and remove from groups

AD + Entra ID

Malicious OAuth App

Revoke consent, disable app

Entra ID Enterprise Apps

Golden Ticket Suspected

Reset KRBTGT (twice)

AD KRBTGT reset script

Unauthorized Role Assignment

Remove role assignment

Entra ID / PIM

Privileged Account Remediation

Active Directory

Entra ID

KRBTGT Reset Procedure

⚠️ Warning: KRBTGT reset affects all Kerberos tickets in the domain. Plan carefully and reset twice with appropriate interval.

OAuth Application Remediation


Quick Reference Cards

Privilege Escalation Attack Identification

Attack
Key Indicators
Primary Detection

Kerberoasting

RC4 TGS requests, bulk service ticket requests

Event 4769, MDI

AS-REP Roasting

4768 without pre-auth, accounts with DONT_REQ_PREAUTH

Event 4768, MDI

DCSync

Replication from non-DC, 4662 with replication GUIDs

Event 4662, MDI

Golden Ticket

TGT anomalies, long lifetime, forged PAC

MDI, Event 4768

Silver Ticket

TGS without TGT, service ticket anomalies

MDI, Event 4769

Pass-the-Hash

NTLM from unusual source, network logon type

Event 4776, MDI

Pass-the-Ticket

Kerberos reuse across systems

MDI, correlation

GPO Abuse

GPO modification, link changes

Event 5136, 5137

AdminSDHolder

ACL modification on protected objects

Event 4780

Delegation Abuse

msDS-AllowedToDelegateTo changes

Event 5136, MDI

Critical AD Object GUIDs for Detection

GUID
Object/Permission
Risk

1131f6aa-9c07-11d1-f79f-00c04fc2dcd2

DS-Replication-Get-Changes

DCSync

1131f6ad-9c07-11d1-f79f-00c04fc2dcd2

DS-Replication-Get-Changes-All

DCSync

89e95b76-444d-4c62-991a-0facbeda640c

DS-Replication-Get-Changes-In-Filtered-Set

DCSync

00000000-0000-0000-0000-000000000000

All extended rights

Full control

00299570-246d-11d0-a768-00aa006e0529

User-Force-Change-Password

Password reset

Entra ID Critical Roles

Role
Risk Level
Monitor For

Global Administrator

Critical

Any assignment

Privileged Role Administrator

Critical

Any assignment

Security Administrator

High

Unusual assignment

Exchange Administrator

High

Mailbox access abuse

SharePoint Administrator

High

Data access abuse

Application Administrator

High

App permission abuse

Cloud Application Administrator

High

App permission abuse

Authentication Administrator

High

MFA/password bypass

User Administrator

Medium

Account creation


Escalation Matrix

Severity Classification

Severity
Criteria
Response Time

🔴 Critical

Domain Admin compromise, DCSync confirmed, Golden Ticket, Global Admin compromise

Immediate - 15 min

🟠 High

Privileged account compromise, sensitive group changes, Kerberoasting success

30 min - 1 hour

🟡 Medium

Privilege escalation attempt blocked, suspicious privilege usage

4 hours

🟢 Low

Failed privilege escalation, reconnaissance activity

Next business day

Escalation Triggers

Condition
Escalation Level

Domain Admin/Global Admin compromised

DFIR + Identity Team + CISO

DCSync/Golden Ticket detected

DFIR + Identity Team

Multiple privileged accounts affected

Tier 2 SOC + DFIR

Kerberoasting with successful cracks

Tier 2 SOC

Sensitive group membership change

Tier 2 SOC

Unauthorized PIM activation

Tier 2 SOC

OAuth admin consent abuse

Tier 2 SOC + App Owner

Notification Requirements

Severity
Internal Notification
External Notification

Critical

CISO, CIO, Legal (1 hour)

Consider regulatory (24-72 hours)

High

Security Leadership (4 hours)

As required

Medium

SOC Manager (next shift)

N/A

Low

Standard reporting

N/A


MITRE ATT&CK Mapping

Privilege Escalation (TA0004)

Technique
ID
Description
Detection

Abuse Elevation Control Mechanism

T1548

UAC bypass, sudo abuse

DeviceProcessEvents

Access Token Manipulation

T1134

Token theft/impersonation

DeviceEvents

Boot or Logon Autostart

T1547

Persistence for priv code

DeviceRegistryEvents

Create or Modify System Process

T1543

Service/daemon creation

DeviceEvents

Domain Policy Modification

T1484

GPO modification

SecurityEvent 5136

Event Triggered Execution

T1546

WMI, accessibility features

DeviceEvents

Exploitation for Privilege Escalation

T1068

Kernel/software exploits

MDE Alerts

Hijack Execution Flow

T1574

DLL hijacking, path interception

DeviceProcessEvents

Process Injection

T1055

Code injection techniques

DeviceEvents

Scheduled Task/Job

T1053

Elevated task creation

DeviceEvents

Valid Accounts

T1078

Privileged account abuse

SigninLogs, IdentityLogonEvents

Technique
ID
Description
Detection

OS Credential Dumping

T1003

LSASS, SAM, DCSync

DeviceEvents, SecurityEvent 4662

Steal or Forge Kerberos Tickets

T1558

Golden/Silver ticket, Kerberoasting

SecurityEvent 4768/4769, MDI

Unsecured Credentials

T1552

Credentials in files/registry

DeviceFileEvents

Technique
ID
Description
Detection

Account Manipulation

T1098

Add credentials, SSH keys

AuditLogs, SecurityEvent

Create Account

T1136

Local/domain/cloud accounts

SecurityEvent 4720, AuditLogs


Appendix: Investigation Commands

Active Directory Enumeration

ACL Analysis

Entra ID Investigation

Local Privilege Escalation Checks


⚠️ Critical Reminder: Privilege escalation investigations often uncover broader compromise. Always assume lateral movement has occurred and expand investigation scope accordingly. When Domain Admin or Global Admin compromise is suspected, engage DFIR immediately and consider the entire environment potentially compromised.

Last updated