Query Details
// Kerberos traffic from unusual Windows process DeviceNetworkEvents | where RemotePort == 88 // -- BEGIN FALSE POSITIVES -- | where InitiatingProcessFileName != "" // missing sensor data | where InitiatingProcessFolderPath !~ "c:\\windows\\system32\\lsass.exe" // Windows default kerberos client // -- END FALSE POSITIVES -- | where AdditionalFields !contains "Posix" // ignore Linux and Mac | sort by Timestamp
This query is looking for Kerberos traffic from a Windows process that is not the default Kerberos client. It filters out false positives and ignores Linux and Mac systems. The results are sorted by timestamp.

C.J. May
Released: November 6, 2023
Tables
Keywords
Operators