SPNs cleared from a machine account
#
This Playbook is part of the Cortex Response And Remediation Pack.Supported versions
Supported Cortex XSOAR versions: 8.9.0 and later.
This playbook addresses the following alerts:
- SPNs cleared from a machine account
- SPNs cleared from a machine account for the first time
Playbook Stages:
Triage:
- Retrieve additional data about the Account Changed event, including the Machine Account whose SPNs were cleared and the number of times the user cleared SPNs in the last 30 days.
Investigation:
- Search for creation of suspicious account on the Domain Controller.
- Search for suspicious TGT/Service ticket requests.
- Search for user insights associated with malicious tools related to Kerberos ticket manipulation.
- Search for suspicious account renames, particularly to mimic DC name.
- Search for additional alerts in the incident that could indicate attempts to find controlled accounts or create accounts.
Containment:
- For alerts determined to be true positives, prompt the analyst to decide whether to disable the user account.
- Upon analyst approval: Disable the suspicious user account in Active Directory.
Requirements:
For response actions, you need the following integrations:
- Active Directory Query v2.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
IntegrationsThis playbook does not use any integrations.
#
Scripts- SearchAlertsV2
- Set
- SetAndHandleEmpty
#
Commands- ad-disable-account
- closeInvestigation
- core-get-cloud-original-alerts
#
Playbook InputsThere are no inputs for this playbook.
#
Playbook OutputsThere are no outputs for this playbook.