Unauthorised Access & Privilege Escalation Investigation Runbook
SOC & DFIR Operations Guide
Overview & Scope
Attack Categories
Unauthorised Access Types
Type
Description
Examples
Privilege Escalation Types
Type
Description
Target
Common Attack Techniques
On-Premises AD Privilege Escalation
Technique
Description
Risk Level
Cloud Privilege Escalation
Technique
Description
Risk Level
Local Privilege Escalation
Technique
Description
Risk Level
Detection Sources & Data Mapping
Log Sources Matrix
Platform
Log Table
Key Data
Critical Windows Event IDs
Authentication & Access
Event ID
Description
Investigation Relevance
Privilege Changes
Event ID
Description
Investigation Relevance
Object & Policy Changes
Event ID
Description
Investigation Relevance
Service & Scheduled Task
Event ID
Description
Investigation Relevance
Investigation Workflows
Unauthorised Access Investigation
Step 1: Initial Triage
Step 2: Access Pattern Analysis
Step 3: Session Analysis
Step 4: Authorisation Verification
Step 5: Impact Assessment
Domain Privilege Escalation Investigation
Step 1: Identify Escalation Vector
Step 2: Sensitive Group Monitoring
Group
Risk
Detection Focus
Step 3: DCSync Detection
Step 4: Kerberos Attack Detection
Step 5: GPO Abuse Detection
Cloud Privilege Escalation Investigation
Step 1: Role Assignment Analysis
Step 2: PIM Activity Review
Step 3: Application Consent Analysis
Step 4: Service Principal Investigation
Step 5: Conditional Access Bypass
Local Privilege Escalation Investigation
Step 1: Process Analysis
Step 2: Service Exploitation Detection
Step 3: Scheduled Task Analysis
Step 4: Exploit Indicators
KQL Query Cheat Sheet
Privileged Account Monitoring
Privileged Logon Activity
Special Privileges Assigned (4672)
First-Time Privileged Access
Sensitive Group Changes
Domain Admin Group Modifications
Entra ID Role Assignments
PIM Role Activations
Kerberos Attack Detection
Kerberoasting Detection
AS-REP Roasting Detection
Golden Ticket Indicators
Silver Ticket / Service Ticket Anomalies
DCSync & Replication Attacks
DCSync Detection
Defender for Identity - DCSync
ACL & Permission Abuse
AdminSDHolder Modification
Object Permission Changes
Delegation Configuration Changes
Local Privilege Escalation
Token Manipulation Detection
Suspicious Service Installation
UAC Bypass Detection
Scheduled Task Privilege Escalation
OAuth & Application Abuse
Suspicious OAuth Consent Grants
Application Permission Changes
Service Principal Credential Addition
Conditional Access & Access Policy
Conditional Access Policy Changes
Sign-ins Bypassing Conditional Access
Legacy Authentication Usage
Lateral Movement Detection
Unusual Lateral Movement Patterns
Pass-the-Hash / Pass-the-Ticket
Response Actions & Remediation
Immediate Containment Actions
Scenario
Action
Method
Privileged Account Remediation
Active Directory
Entra ID
KRBTGT Reset Procedure
OAuth Application Remediation
Quick Reference Cards
Privilege Escalation Attack Identification
Attack
Key Indicators
Primary Detection
Critical AD Object GUIDs for Detection
GUID
Object/Permission
Risk
Entra ID Critical Roles
Role
Risk Level
Monitor For
Escalation Matrix
Severity Classification
Severity
Criteria
Response Time
Escalation Triggers
Condition
Escalation Level
Notification Requirements
Severity
Internal Notification
External Notification
MITRE ATT&CK Mapping
Privilege Escalation (TA0004)
Technique
ID
Description
Detection
Credential Access (Related)
Technique
ID
Description
Detection
Persistence (Related)
Technique
ID
Description
Detection
Appendix: Investigation Commands
Active Directory Enumeration
ACL Analysis
Entra ID Investigation
Local Privilege Escalation Checks
Last updated