Windows AD GPO Disabled
Detection of Active Directory Group Policy being disabled using the Group Policy Management Console, potentially indicating malicious attempts to weaken security controls.
This detection identifies when an Active Directory Group Policy (GPO) is disabled using the Group Policy Management Console. Disabling a GPO can be a sign of malicious activity, as attackers may attempt to weaken or bypass security controls. The detection focuses on changes to the flags attribute of GPO objects within Active Directory. It uses Windows Event Log Security event ID 5136 in conjunction with Active Directory monitoring (admon) data to correlate the event with the GPO’s display name. The disabling of GPOs could allow attackers to more easily move laterally within the network or achieve persistence. The event indicates whether the GPO is disabled for user configuration settings, computer configuration settings, or entirely disabled.
Attack Chain
- An attacker gains privileged access to an Active Directory account with permissions to modify GPOs.
- The attacker uses the Group Policy Management Console (GPMC) to access and modify a target GPO.
- The attacker changes the
flagsattribute of the GPO, effectively disabling it. This triggers Windows Event ID 5136. - The event 5136 is logged in the Windows Security event log on the domain controller. The
AttributeLDAPDisplayNameisflagsandOperationTypeis%%14674. - The change is replicated to other domain controllers in the Active Directory environment.
- Active Directory monitoring tools capture the update event for the GPO, logging details such as the
distinguishedNameanddisplayName. - Security monitoring systems ingest both the Windows Security event log and the Active Directory monitoring data.
- The detection correlates the event 5136 with the AD monitoring data using the
ObjectDNto identify the disabled GPO by itsdisplayName.
Impact
Successful disabling of Group Policy Objects can lead to a significant degradation of security posture. Attackers might disable policies that enforce password complexity, restrict software execution, or audit user activity. This can allow attackers to establish persistence, move laterally within the network, and compromise sensitive data with reduced risk of detection. The scope of impact depends on the role and scope of the disabled GPO.
Recommendation
- Enable Active Directory auditing, specifically event ID 5136, to capture GPO modifications, as described in the referenced Splunk Lantern article.
- Ensure the
wineventlog_securityandadmonmacros are correctly configured to point to the relevant indexes containing Windows Security event logs and Active Directory monitoring data. - Deploy the provided Sigma rule
Detect Windows AD GPO Disabledto identify instances of GPOs being disabled. - Investigate any alerts generated by the Sigma rule, focusing on the source user (
src_user) and the affected GPO (policyName). - Monitor for unexpected changes to Group Policy settings, as disabling GPOs is not a routine administrative task.
Detection coverage 3
Detect Windows AD GPO Disabled
lowDetects when an Active Directory Group Policy is disabled.
Detect Windows AD GPO Disabled via Event Log
mediumDetects when an Active Directory Group Policy is disabled based on Windows Event ID 5136
Detect Windows AD GPO Disabled - ADMON
mediumDetects when an Active Directory Group Policy is disabled using ADMON data
Detection queries are kept inside the platform. Get full rules →