Query Details
// Password Spraying Detection in Active Directory // https://www.semperis.com/blog/password-spraying-detection-in-active-directory/ // Event ID 4625 // Mitre ATT&CK T1110 Anomalies | where TimeGenerated > ago(1d) | where RuleName == "Attempted user account bruteforce per logon type" or RuleName == "Attempted user account bruteforce" | where Score > 0.5
This query is designed to detect password spraying attacks in Active Directory by looking for specific anomalies in security events. Here's a simple breakdown:
TimeGenerated > ago(1d)).RuleName == "Attempted user account bruteforce per logon type" or RuleName == "Attempted user account bruteforce").Score > 0.5).In summary, this query identifies significant brute force attack attempts on user accounts within the past day.

Steven Lim
Released: September 19, 2024
Tables
Keywords
Operators