Initial Access (TA0001)
Sub-technique: T1078.001 - Default Accounts
Objective: Detect unauthorised access using default accounts.
Default Account Logins
IdentityLogonEvents
| where AccountName in ("Administrator", "Guest", "root")
| summarize event_count = count() by AccountName, DeviceName, bin(TimeGenerated, 1h)
| where event_count > 1
| project TimeGenerated, AccountName, DeviceName, event_count
| order by event_count descPurpose: Monitor login events using default accounts.
Detect Administrator Account Usage
IdentityLogonEvents
| where AccountName == "Administrator"
| summarize event_count = count() by DeviceName, bin(TimeGenerated, 1h)
| where event_count > 1
| project TimeGenerated, DeviceName, event_count
| order by event_count descPurpose: Identify unusual usage of the Administrator account.
Guest Account Logins
Purpose: Detect any use of the Guest account.
Multiple Failed Login Attempts for Default Accounts
Purpose: Identify failed login attempts for default accounts.
Detect Unauthorized Access Attempts to Default Accounts
Purpose: Detect remote access attempts to default accounts.
Logins from Multiple IPs for Default Accounts
Purpose: Identify default account logins from multiple IPs.
Identify Default Accounts with Elevated Privileges
Purpose: Monitor default accounts for elevation to administrative privileges.
Detect Default Account Creation
Purpose: Identify the creation of default accounts.
Detect Changes to Default Account Permissions
Purpose: Monitor for permission changes to default accounts.
Detect Default Account Logins During Off-Hours
Purpose: Identify off-hour logins using default accounts.
Last updated