Academy

Module 10 Β· AD Detection β€” What Good Looks Like πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 22, 2026
5 min read

Every attack in this track leaves footprints in AD logs, Sysmon events, EDR telemetry, and domain controller security logs. Most go undetected because organizations either don’t collect the right logs, don’t write detection rules for AD-specific TTPs, or don’t have the process to respond to alerts in time. This closing module covers what AD detection looks like when done right.

Why AD detection is hard

  • Volume. DCs generate thousands of events per second in busy environments. Signal to noise is brutal without tuning.
  • Normal admin = suspicious attacker. DCSync is used legitimately by replication (normal) and by attackers (suspicious). Distinguishing requires context (source, time, frequency).
  • Default log coverage insufficient. Windows default Security logs capture much but miss things like PowerShell script content, ACL changes without auditing explicitly enabled.
  • Cross-source correlation required. “Unusual Kerberos ticket” is partial; combined with “unusual process on endpoint” it’s high-confidence.

Critical log sources for AD detection

# Domain Controllers β€” Security log events to ingest:
# 4624  Successful logon
# 4625  Failed logon
# 4768  TGT request (Kerberos authentication)
# 4769  TGS request (Kerberos service ticket) ← Kerberoasting signal
# 4662  Operation performed on AD object ← DCSync signal
# 4672  Special privileges assigned to new logon ← admin logon
# 4698  Scheduled task created (persistence)
# 4720  User account created
# 4732  Member added to security-enabled local group
# 4756  Member added to security-enabled universal group (Enterprise Admins)
# 5136  Directory service object modified ← ACL changes

# Endpoints β€” Sysmon + Windows event logs:
# Sysmon 1  Process creation
# Sysmon 3  Network connection
# Sysmon 7  Image loaded
# Sysmon 10 Process access (Mimikatz to LSASS)
# Sysmon 11 File created
# 4688      Process creation (native Windows)

# Enable: Advanced Audit Policies for these event IDs
# Audit Kerberos Authentication Service, Audit Kerberos Service Ticket Operations
# Audit Directory Service Changes, Audit Directory Service Access

Core detection rules

Kerberoasting

# Multiple TGS requests from one account for different SPNs in short window
# Sigma rule example
title: Kerberoasting activity
logsource:
  product: windows
  service: security
detection:
  selection:
    EventID: 4769
    TicketEncryptionType: '0x17'  # RC4 (attacker preference)
    TicketOptions: '0x40810000'
  filter:
    ServiceName|endswith: '$'      # computer accounts, ignore
  condition: selection and not filter
# Followed by: aggregate by AccountName, count distinct ServiceName > 10 in 10 min

DCSync detection

# Event 4662 with replication GUIDs
# From a source that isn't another DC

title: DCSync Attack
detection:
  selection:
    EventID: 4662
    Properties|contains:
      - '1131f6aa-9c07-11d1-f79f-00c04fc2dcd2'  # DS-Replication-Get-Changes
      - '1131f6ad-9c07-11d1-f79f-00c04fc2dcd2'  # DS-Replication-Get-Changes-All
  filter:
    AccountName|endswith: '$'  # Ignore legitimate DC replication
  condition: selection and not filter

Golden/Silver Ticket

Hard to detect directly. Indirect indicators:

  • TGT with unusual lifetime (default 10 hours; forged tickets often 10 years)
  • Kerberos pre-auth missing for TGT use
  • Mismatched domain controllers in event chain
  • Service ticket without corresponding TGT request (Silver Ticket)

ACL changes to sensitive objects

# Event 5136 on AdminSDHolder or privileged groups
title: ACL change on sensitive AD object
detection:
  selection:
    EventID: 5136
    ObjectDN|contains:
      - 'AdminSDHolder'
      - 'CN=Domain Admins'
      - 'CN=Enterprise Admins'
      - 'CN=Schema Admins'
  condition: selection

Unconstrained delegation + coercion

  • Event 4624 type 3 (network logon) from DC to workstation (unusual)
  • SMB access patterns from DCs to endpoints
  • Spooler service activity on DCs (shouldn’t be running)

BloodHound / SharpHound activity

  • LDAP queries with unusual patterns (many filter types, sequential)
  • SharpHound PE signature in process creation events
  • Registry access to HKLM\SAM (local account enumeration)
  • SMB session enumeration patterns

Commercial detection products

  • Microsoft Defender for Identity (MDI): reads AD event logs + passive traffic. Detects Kerberoasting, DCSync, Golden Ticket attempts, SharpHound, and many more. Built into M365 E5.
  • CrowdStrike Falcon Identity Protection: similar capabilities, integrated with Falcon EDR.
  • Semperis Directory Services Protector: AD-focused; attack path monitoring + rollback.
  • Tenable Identity Exposure: AD hygiene + attack detection.
  • PingCastle + Purple Knight: free posture scanning (not real-time detection).

Defender for Identity specifics

MDI has built-in detections for:

πŸ” Advanced Module Β· Pro Tier

Continue reading with Pro tier (β‚Ή4,999/year)

You've read 33% of this module. Unlock the remaining deep-dive, quiz, and every other Advanced/Expert module.

136+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
3 more sections locked below