Initial Access (TA0001)

Sub-technique: T1078.001 - Default Accounts

Objective: Detect unauthorised access using default accounts.

  1. Default Account Logins

IdentityLogonEvents
| where AccountName in ("Administrator", "Guest", "root")
| summarize event_count = count() by AccountName, DeviceName, bin(TimeGenerated, 1h)
| where event_count > 1
| project TimeGenerated, AccountName, DeviceName, event_count
| order by event_count desc

Purpose: Monitor login events using default accounts.

  1. Detect Administrator Account Usage

IdentityLogonEvents
| where AccountName == "Administrator"
| summarize event_count = count() by DeviceName, bin(TimeGenerated, 1h)
| where event_count > 1
| project TimeGenerated, DeviceName, event_count
| order by event_count desc

Purpose: Identify unusual usage of the Administrator account.

  1. Guest Account Logins

Purpose: Detect any use of the Guest account.

  1. Multiple Failed Login Attempts for Default Accounts

Purpose: Identify failed login attempts for default accounts.

  1. Detect Unauthorized Access Attempts to Default Accounts

Purpose: Detect remote access attempts to default accounts.

  1. Logins from Multiple IPs for Default Accounts

Purpose: Identify default account logins from multiple IPs.

  1. Identify Default Accounts with Elevated Privileges

Purpose: Monitor default accounts for elevation to administrative privileges.

  1. Detect Default Account Creation

Purpose: Identify the creation of default accounts.

  1. Detect Changes to Default Account Permissions

Purpose: Monitor for permission changes to default accounts.

  1. Detect Default Account Logins During Off-Hours

Purpose: Identify off-hour logins using default accounts.

Last updated