Skip to main content

Reconnaissance Folder Templates

The Reconnaissance folder contains the following templates:

TemplateDescriptionTAGS
BloodHound DetectionBloodHound is a tool that is used to reveal hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. https://github.com/BloodHoundAD/BloodHound This policy will detect the latest BloodHound/Sharphound and Ingestor generated queries in your environment- NEW 5.1 TEMPLATES - Reconnaissance - Bloodhound - LDAP
Directory Read: Malicious DPAPI Secret RevealThis secret should only be retrieved by NTAuthority System on a domain controller thus any activity by a user or computer should be considered a threat.- NEW 7.1 TEMPLATES - DPAPI
LDAP: Account ReconnaissanceThis is the recommended policy for detecting signature queries of LDAP reconnaissance tools.- NEW 7.1 TEMPLATES - LDAP - Reconnaissance
LDAP: Admin AccountsThis Policy will detect LDAP queries targeting sensitive accounts, such as Administrator. You can add and delete to this list under the LDAP Query tab as per your specific requirements- NEW 5.1 TEMPLATES - LDAP - Reconnaissance - Privileged Accounts
LDAP: GMSA PasswordDetects when the password for a Group Managed Service Account is read * This policy should exclude the computer accounts used that are allowed to retrieve the password- NEW 7.1 TEMPLATES - GMSA - Password
LDAP: LAPS Security & Active Directory LAPS Configuration ReconMicrosoft’s LAPS is a useful tool for automatically managing Windows computer local Administrator passwords. Since LAPS requires the computer attributes to be present, attackers can check to see if LAPS is “installed” in Active Directory by checking for the presence of the LAPS attributes in AD. This policy will identify attempts to query AD for attributes that associated with the presence of LAPS- NEW 5.1 TEMPLATES - LAPS - Reconnaissance
LDAP: Managed Service Accounts ReconThis policy can be configured to detect attempts to discover managed service accounts. It looks for LDAP queries of cn=msDS-ManagedServiceAccount- NEW 5.1 TEMPLATES - LDAP - Reconnaissance - Privileged Accounts - Managed Service Accounts
LDAP: Service Accounts ReconIf intruders attack a service that uses a highly privileged System account, they might be able to conduct further exploits under that account's context. Many organizations use common cosmetic naming conventions to denote service accounts or maintain a list of service accounts. This policy can be configured to detect attempts to discover service accounts.- NEW 5.1 TEMPLATES - LDAP - Reconnaissance - Service Accounts