The Anomaly Detection using Sigma rules component provides User Account Control functionality using the predefined collection of Sigma rules, Rules collection for User Account Control (UAC) logs analysis.
The collection of Sigma rules covers the following events:
For the list of IDs, see the table below.
The behavior of the application depends on whether the computer belongs to a domain or not:
To enable user account control:
The policy properties window opens.
The Adding a rules collection window opens.
When a Sigma rule from the collection triggers, the application generates an event and sends it to Kaspersky Security Center and Kaspersky Industrial CyberSecurity for Nodes for Network.
IDs of events in the collection of User Account Control Sigma rules
Event |
Windows XP |
Windows 7 and later |
|---|---|---|
Adding a new user |
624 |
4720 |
Adding a user to the administrators group |
632 636 660 |
4728 4732 4756 |
User privilege elevation |
576 633 637 639 641 659 661 |
4729 4733 4735 4737 4755 4757 4672 4964 |
User login |
528 540 |
4624 |
User login attempt |
529 530 531 532 533 534 535 536 537 539 |
4625 |
User logout |
538 |
4634 |