Unauthorised Access & Privilege Escalation Investigation Runbook
SOC & DFIR Operations Guide
Environment: Windows AD | Microsoft 365 | Defender XDR | Sentinel | Entra ID | Palo Alto Prisma Access
Overview & Scope
This runbook provides standardised procedures for investigating unauthorised access attempts and privilege escalation attacks across the hybrid enterprise environment. It covers detection, investigation, containment, and remediation workflows for both on-premises Active Directory and cloud identity platforms.
Attack Categories
Unauthorised Access Types
Credential-Based
Using stolen/compromised credentials
Phishing, credential stuffing, password spray
Session Hijacking
Taking over active sessions
Token theft, cookie hijacking, session replay
Authentication Bypass
Circumventing authentication controls
MFA bypass, legacy protocol abuse, CA policy gaps
Access Control Abuse
Exploiting misconfigurations
Overprivileged accounts, broken access control
Insider Threat
Authorized users exceeding permissions
Data theft, unauthorized system access
Privilege Escalation Types
Local Privilege Escalation
User → Admin on single system
Endpoints, servers
Domain Privilege Escalation
User → Domain Admin
Active Directory
Cloud Privilege Escalation
User → Global Admin
Entra ID, M365
Horizontal Escalation
Access to peer accounts/resources
Lateral movement
Vertical Escalation
Lower → Higher privilege level
Elevation of privilege
Common Attack Techniques
On-Premises AD Privilege Escalation
Kerberoasting
Crack service account passwords via TGS
High
AS-REP Roasting
Crack passwords for accounts without pre-auth
High
DCSync
Replicate password hashes from DC
Critical
Golden Ticket
Forge TGT with KRBTGT hash
Critical
Silver Ticket
Forge TGS for specific services
High
AdminSDHolder Abuse
Modify protected groups ACLs
Critical
GPO Abuse
Modify Group Policy for persistence/escalation
Critical
DACL/ACL Abuse
Exploit misconfigured object permissions
High
Unconstrained Delegation
Capture TGTs from connecting users
Critical
Constrained Delegation Abuse
Impersonate users to specific services
High
Resource-Based Constrained Delegation
Modify delegation settings
High
Print Spooler Abuse
PrintNightmare, SpoolSample
High
Certificate Template Abuse
AD CS misconfigurations
Critical
Shadow Credentials
Add key credentials to user objects
High
LAPS Abuse
Access local admin passwords
High
Cloud Privilege Escalation
Entra ID Role Assignment
Add user to privileged roles
Critical
PIM Abuse
Activate/exploit privileged roles
Critical
OAuth Consent Grant
Gain app permissions via consent
High
Application Impersonation
Use app permissions to access data
High
Service Principal Abuse
Exploit app registration permissions
High
Conditional Access Bypass
Circumvent CA policies
High
Cross-Tenant Access
Abuse B2B/B2C configurations
High
Administrative Unit Abuse
Escape AU restrictions
Medium
Local Privilege Escalation
Token Manipulation
Impersonate privileged tokens
High
UAC Bypass
Circumvent User Account Control
Medium
DLL Hijacking
Load malicious DLLs in privileged context
High
Service Exploitation
Abuse misconfigured services
High
Scheduled Task Abuse
Create/modify tasks for elevation
Medium
Unquoted Service Paths
Exploit path parsing vulnerabilities
Medium
AlwaysInstallElevated
MSI installation with SYSTEM privileges
High
Kernel Exploits
Exploit OS vulnerabilities
Critical
Named Pipe Impersonation
Impersonate connecting clients
High
Detection Sources & Data Mapping
Log Sources Matrix
On-Prem AD
SecurityEvent
Privileged logons, group changes, ACL modifications
Defender for Identity
IdentityDirectoryEvents
AD object changes, reconnaissance
Defender for Identity
IdentityLogonEvents
Authentication events, anomalies
Defender for Identity
IdentityQueryEvents
LDAP queries, enumeration
Defender for Endpoint
DeviceEvents
Token manipulation, UAC bypass
Defender for Endpoint
DeviceProcessEvents
Privilege escalation tools
Defender for Endpoint
DeviceLogonEvents
Local/remote logons
Entra ID
AuditLogs
Role assignments, PIM activations
Entra ID
SigninLogs
Privileged account access
Cloud Apps
CloudAppEvents
OAuth grants, app permissions
Sentinel
AzureActivity
Azure RBAC changes
Sentinel
SecurityAlert
Correlated privilege alerts
Critical Windows Event IDs
Authentication & Access
4624
Successful logon
Track privileged access patterns
4625
Failed logon
Brute force, unauthorized access attempts
4648
Explicit credential logon
Credential usage, lateral movement
4672
Special privileges assigned
Admin/privileged logon detection
4768
Kerberos TGT requested
Initial authentication, AS-REP roasting
4769
Kerberos TGS requested
Kerberoasting, service access
4771
Kerberos pre-auth failed
Password attacks
4776
NTLM authentication
Legacy auth, Pass-the-Hash
Privilege Changes
4728
Member added to security group
Privilege escalation
4729
Member removed from security group
Access revocation, cover-up
4732
Member added to local group
Local privilege escalation
4733
Member removed from local group
Access changes
4756
Member added to universal group
Enterprise-wide access
4757
Member removed from universal group
Access changes
Object & Policy Changes
4662
Object access operation
DCSync detection, AD object access
4663
Object access attempted
File/folder access
4670
Permissions changed on object
ACL modification
4713
Kerberos policy changed
Security policy tampering
4719
System audit policy changed
Audit evasion
4739
Domain policy changed
Domain-wide changes
4780
ACL set on admin accounts
AdminSDHolder modification
5136
Directory object modified
AD attribute changes
5137
Directory object created
New AD objects
5141
Directory object deleted
AD object removal
Service & Scheduled Task
4697
Service installed
Persistence, privilege escalation
4698
Scheduled task created
Persistence mechanism
4699
Scheduled task deleted
Cover-up activity
4700
Scheduled task enabled
Activation of persistence
4702
Scheduled task updated
Modification of tasks
Investigation Workflows
Unauthorised Access Investigation
Objective: Determine if access was unauthorised, identify the access method, assess impact, and remediate.
Step 1: Initial Triage
Review the alert source and detection logic
Identify the account and resource accessed
Verify if access was expected/authorised
Check account type: user, service, admin, guest
Determine time of access vs. normal working hours
Step 2: Access Pattern Analysis
Query SigninLogs/SecurityEvent for account history
Compare current access to baseline behaviour
Check source IP, location, and device
Review authentication method used
Identify any Conditional Access policy bypasses
Step 3: Session Analysis
Determine session duration and activity
Query all resources accessed during session
Check for data access, downloads, or modifications
Review email activity if applicable
Examine file access patterns
Step 4: Authorisation Verification
Confirm account's authorised access level
Check group memberships and role assignments
Verify if access was within scope of permissions
Review any recent permission changes
Contact account owner if needed for verification
Step 5: Impact Assessment
Document all resources accessed
Identify sensitive data exposure
Check for data exfiltration indicators
Assess potential for lateral movement
Determine business impact
Domain Privilege Escalation Investigation
Objective: Detect and investigate attempts to gain elevated privileges within Active Directory.
Step 1: Identify Escalation Vector
Review MDI alerts for known attack patterns
Check for Kerberoasting/AS-REP Roasting indicators
Look for DCSync or replication anomalies
Review sensitive group membership changes
Check for delegation abuse
Step 2: Sensitive Group Monitoring
Critical Groups to Monitor:
Domain Admins
Critical
Any membership change
Enterprise Admins
Critical
Any membership change
Schema Admins
Critical
Any membership change
Administrators
Critical
Non-standard additions
Account Operators
High
Can create/modify accounts
Backup Operators
High
Can access any file
Server Operators
High
Can logon to DCs
Print Operators
High
Can load drivers on DCs
DnsAdmins
High
Can execute code on DCs
Group Policy Creator Owners
High
Can create GPOs
Step 3: DCSync Detection
Query for Directory Replication Service Access
Check 4662 events for replication GUIDs
Verify source is a legitimate domain controller
Review MDI alerts for DCSync detection
Check for DRSUAPI calls from non-DCs
Step 4: Kerberos Attack Detection
Review 4769 events for RC4 encryption (0x17)
Check for bulk TGS requests from single user
Look for AS-REQ without pre-auth (4768)
Monitor for ticket anomalies via MDI
Check for golden/silver ticket indicators
Step 5: GPO Abuse Detection
Query for GPO creation/modification events
Check for GPO links to sensitive OUs
Review script deployment via GPO
Look for scheduled task deployment
Monitor for software installation changes
Cloud Privilege Escalation Investigation
Objective: Detect and investigate privilege escalation within Entra ID and Microsoft 365.
Step 1: Role Assignment Analysis
Query AuditLogs for role assignment events
Identify who assigned the role and when
Verify the assignment was authorised
Check if proper approval workflow was followed
Review the user's other role assignments
Step 2: PIM Activity Review
Query for PIM role activations
Check justification provided for activation
Verify approval if required
Review activation duration
Analyse activity during activation period
Step 3: Application Consent Analysis
Query for OAuth consent grant events
Identify permissions granted
Check if admin consent was required/given
Review the application's reputation
Assess risk of granted permissions
Step 4: Service Principal Investigation
Review service principal permission changes
Check for credential/secret additions
Identify API permissions granted
Review owner assignments
Check for federation configurations
Step 5: Conditional Access Bypass
Review sign-ins that bypassed CA policies
Identify policy gaps or exclusions
Check for legacy authentication usage
Review named locations and trusted IPs
Assess device compliance bypasses
Local Privilege Escalation Investigation
Objective: Detect and investigate attempts to gain SYSTEM or admin privileges on endpoints.
Step 1: Process Analysis
Review DeviceProcessEvents for suspicious activity
Check for known escalation tools (mimikatz, etc.)
Analyse parent-child process relationships
Look for unusual SYSTEM process creation
Check for token manipulation indicators
Step 2: Service Exploitation Detection
Review service creation/modification events
Check for unquoted service paths
Look for writable service binaries
Review service account permissions
Check for DLL hijacking opportunities
Step 3: Scheduled Task Analysis
Query for task creation by non-admin users
Check for SYSTEM-level task execution
Review task actions and triggers
Look for suspicious task paths
Check for legacy AT jobs
Step 4: Exploit Indicators
Review MDE alerts for exploit detection
Check for kernel exploit indicators
Look for UAC bypass patterns
Review memory injection alerts
Check for driver loading anomalies
KQL Query Cheat Sheet
Privileged Account Monitoring
Privileged Logon Activity
Special Privileges Assigned (4672)
First-Time Privileged Access
Sensitive Group Changes
Domain Admin Group Modifications
Entra ID Role Assignments
PIM Role Activations
Kerberos Attack Detection
Kerberoasting Detection
AS-REP Roasting Detection
Golden Ticket Indicators
Silver Ticket / Service Ticket Anomalies
DCSync & Replication Attacks
DCSync Detection
Defender for Identity - DCSync
ACL & Permission Abuse
AdminSDHolder Modification
Object Permission Changes
Delegation Configuration Changes
Local Privilege Escalation
Token Manipulation Detection
Suspicious Service Installation
UAC Bypass Detection
Scheduled Task Privilege Escalation
OAuth & Application Abuse
Suspicious OAuth Consent Grants
Application Permission Changes
Service Principal Credential Addition
Conditional Access & Access Policy
Conditional Access Policy Changes
Sign-ins Bypassing Conditional Access
Legacy Authentication Usage
Lateral Movement Detection
Unusual Lateral Movement Patterns
Pass-the-Hash / Pass-the-Ticket
Response Actions & Remediation
Immediate Containment Actions
Compromised Privileged Account
Disable account
AD + Entra ID disable
Active Privilege Escalation
Isolate affected systems
MDE device isolation
DCSync Detected
Block source IP, disable account
Firewall + AD disable
Rogue Admin Account
Disable and remove from groups
AD + Entra ID
Malicious OAuth App
Revoke consent, disable app
Entra ID Enterprise Apps
Golden Ticket Suspected
Reset KRBTGT (twice)
AD KRBTGT reset script
Unauthorized Role Assignment
Remove role assignment
Entra ID / PIM
Privileged Account Remediation
Active Directory
Entra ID
KRBTGT Reset Procedure
⚠️ Warning: KRBTGT reset affects all Kerberos tickets in the domain. Plan carefully and reset twice with appropriate interval.
OAuth Application Remediation
Quick Reference Cards
Privilege Escalation Attack Identification
Kerberoasting
RC4 TGS requests, bulk service ticket requests
Event 4769, MDI
AS-REP Roasting
4768 without pre-auth, accounts with DONT_REQ_PREAUTH
Event 4768, MDI
DCSync
Replication from non-DC, 4662 with replication GUIDs
Event 4662, MDI
Golden Ticket
TGT anomalies, long lifetime, forged PAC
MDI, Event 4768
Silver Ticket
TGS without TGT, service ticket anomalies
MDI, Event 4769
Pass-the-Hash
NTLM from unusual source, network logon type
Event 4776, MDI
Pass-the-Ticket
Kerberos reuse across systems
MDI, correlation
GPO Abuse
GPO modification, link changes
Event 5136, 5137
AdminSDHolder
ACL modification on protected objects
Event 4780
Delegation Abuse
msDS-AllowedToDelegateTo changes
Event 5136, MDI
Critical AD Object GUIDs for Detection
1131f6aa-9c07-11d1-f79f-00c04fc2dcd2
DS-Replication-Get-Changes
DCSync
1131f6ad-9c07-11d1-f79f-00c04fc2dcd2
DS-Replication-Get-Changes-All
DCSync
89e95b76-444d-4c62-991a-0facbeda640c
DS-Replication-Get-Changes-In-Filtered-Set
DCSync
00000000-0000-0000-0000-000000000000
All extended rights
Full control
00299570-246d-11d0-a768-00aa006e0529
User-Force-Change-Password
Password reset
Entra ID Critical Roles
Global Administrator
Critical
Any assignment
Privileged Role Administrator
Critical
Any assignment
Security Administrator
High
Unusual assignment
Exchange Administrator
High
Mailbox access abuse
SharePoint Administrator
High
Data access abuse
Application Administrator
High
App permission abuse
Cloud Application Administrator
High
App permission abuse
Authentication Administrator
High
MFA/password bypass
User Administrator
Medium
Account creation
Escalation Matrix
Severity Classification
🔴 Critical
Domain Admin compromise, DCSync confirmed, Golden Ticket, Global Admin compromise
Immediate - 15 min
🟠 High
Privileged account compromise, sensitive group changes, Kerberoasting success
30 min - 1 hour
🟡 Medium
Privilege escalation attempt blocked, suspicious privilege usage
4 hours
🟢 Low
Failed privilege escalation, reconnaissance activity
Next business day
Escalation Triggers
Domain Admin/Global Admin compromised
DFIR + Identity Team + CISO
DCSync/Golden Ticket detected
DFIR + Identity Team
Multiple privileged accounts affected
Tier 2 SOC + DFIR
Kerberoasting with successful cracks
Tier 2 SOC
Sensitive group membership change
Tier 2 SOC
Unauthorized PIM activation
Tier 2 SOC
OAuth admin consent abuse
Tier 2 SOC + App Owner
Notification Requirements
Critical
CISO, CIO, Legal (1 hour)
Consider regulatory (24-72 hours)
High
Security Leadership (4 hours)
As required
Medium
SOC Manager (next shift)
N/A
Low
Standard reporting
N/A
MITRE ATT&CK Mapping
Privilege Escalation (TA0004)
Abuse Elevation Control Mechanism
T1548
UAC bypass, sudo abuse
DeviceProcessEvents
Access Token Manipulation
T1134
Token theft/impersonation
DeviceEvents
Boot or Logon Autostart
T1547
Persistence for priv code
DeviceRegistryEvents
Create or Modify System Process
T1543
Service/daemon creation
DeviceEvents
Domain Policy Modification
T1484
GPO modification
SecurityEvent 5136
Event Triggered Execution
T1546
WMI, accessibility features
DeviceEvents
Exploitation for Privilege Escalation
T1068
Kernel/software exploits
MDE Alerts
Hijack Execution Flow
T1574
DLL hijacking, path interception
DeviceProcessEvents
Process Injection
T1055
Code injection techniques
DeviceEvents
Scheduled Task/Job
T1053
Elevated task creation
DeviceEvents
Valid Accounts
T1078
Privileged account abuse
SigninLogs, IdentityLogonEvents
Credential Access (Related)
OS Credential Dumping
T1003
LSASS, SAM, DCSync
DeviceEvents, SecurityEvent 4662
Steal or Forge Kerberos Tickets
T1558
Golden/Silver ticket, Kerberoasting
SecurityEvent 4768/4769, MDI
Unsecured Credentials
T1552
Credentials in files/registry
DeviceFileEvents
Persistence (Related)
Account Manipulation
T1098
Add credentials, SSH keys
AuditLogs, SecurityEvent
Create Account
T1136
Local/domain/cloud accounts
SecurityEvent 4720, AuditLogs
Appendix: Investigation Commands
Active Directory Enumeration
ACL Analysis
Entra ID Investigation
Local Privilege Escalation Checks
⚠️ Critical Reminder: Privilege escalation investigations often uncover broader compromise. Always assume lateral movement has occurred and expand investigation scope accordingly. When Domain Admin or Global Admin compromise is suspected, engage DFIR immediately and consider the entire environment potentially compromised.
Last updated