


Collect data on account creation within a network or Windows Event ID 4720 (for when a user account is created on a Windows system and domain controller). Monitor for newly constructed user accounts through account audits to detect suspicious accounts that may have been created by an adversary. Search for Symantec Endpoint Protection and double click on the name. Click on Windows Start and search for services. Disable Symantec Endpoint Protection (SEP) through Windows Services. Monitor newly executed processes associated with account creation, such as net.exe We can’t disable Symantec Endpoint Protection through the command. Monitor executed commands and arguments for actions that are associated with account creation, such as net user or useradd

Protect domain controllers by ensuring proper security configuration for critical servers.ĭo not allow domain administrator accounts to be used for day-to-day operations that may expose them to potential adversaries on unprivileged systems. Look under Specify real-time protection settings and select No for Enable real-time. In the Default Client Antimalware Policy window, click on Real-time protection in the left menu. Expand Endpoint Protection and click on Antimalware Policies. In the console, click on Assets and Compliance. Use multi-factor authentication for user and privileged accounts.Ĭonfigure access controls and firewalls to limit access to domain controllers and systems used to create and manage accounts. Open Microsoft System Center Configuration Manager. Sandworm Team added a login to a SQL Server with sp_addlinkedsrvlogin. Indrik Spider used wmic.exe to add a new user to the system.
