The security alerts you’re missing…


What you don’t watch for could be exactly what attackers exploit.

Ethical Threat Insight: Security Alerts No One Sets Up (But Should)

Most orgs watch for malware, phishing, account compromise and a whole host of other attacks.

But so often I see, what I would consider low-hanging fruit detections, missed by security teams.

Here’s a few high value alerts not enough orgs have implemented:

  • Active Directory enumeration - especially when privileged (tier 0) resources are touched, like Domain Admins. But also, looking at volume of LDAP traffic from a single host can also be a great indicator of recon activity. By the way, according to a recent CrowdStrike report, 50% of TTPs they see are recon activities.
  • Adding users to local admins on workstations - this one should be obvious, but in reality, I’ve almost never seen orgs alerting on this. The telemetry is there in your EDR waiting for you to use it.
  • Lateral movement with RDP, PSRemoting, SMB - if you’ve done the work to understand your environment, then writing rules to detect when Suzie is attempting to RDP to a domain controller should be easy. But most don’t do the upfront work to get to this point.
  • Hosts without EDR installed - I suspect this should be fairly easy for most orgs. If there are hosts in your network, that you control, that support EDR and it’s not installed, you should know it immediately.

Here’s a few other ideas for alerts that not enough folks have turned on:

  • Service Account Logins (outside expected systems/times)
  • New Domain Admins being added
  • Disabling Security Tools (AV, EDR, logging)
  • Mass File Access (precursor to data theft or ransomware)

Too many organizations rely too much on out of the box configurations of their security tools.

It’s especially evident with EDR.

There are few tools that are truly set it and forget it.

If you don’t create any custom alerts and you don’t review your existing alerts for effectiveness and completeness, you’re leaving room for attackers.

And by the way, one of the best things you can do from a security monitoring perspective, is to setup deception assets.

Whether you’re trying to better detect enumeration/recon, lateral movement, privilege escalation or even credential access…

Deception can be used very effectively for all those use cases.

If you want to see how deception can be used at various stages of an attack, watch the recording of my deception webinar.

P.s. Its helpful to think of attackers like raccoons…they’ll usually jiggle the handle before they try breaking the window. The trick is to have the alert go off when the handle moves. 🦝🔔

All the best
Spencer Alessi

"Spirit of a hacker heart of a defender"
All My Links | super cool cybersecurity shirts & stickers

Spencer Alessi

✔ Pentester/recovering sysadmin ✔ Self-proclaimed Ethical Threat ✔ Active Directory Security Connoisseur ✔ Offensive stuff — securit360.com ✔ Host Cyber Threat POV — offsec.blog ✔ SWAG — swag.ethicalthreat.com 📩 By subscribing, you’ll get exclusive access to industry insights, actionable tips for securing your environments, behind-the-scenes content from my pentests, and updates from someone who keeps a pulse on the ever-changing cyber threat landscape.

Read more from Spencer Alessi
Common Active Directory Security Mistakes Attackers Count On - go.spenceralessi.com

Security applied blindly is just another outage waiting to happen. Ethical Threat Insight: Active Directory Security Mistakes Active Directory is the backbone of your network, and attackers know it just as well (if not better) than most admins. A staggering amount of breaches don’t require fancy exploits. They rely on common misconfigurations, they count on IT admins not doing the hard things that need to be done to secure an AD environment. These are some of the most frequent (and dangerous)...

Downtime is decided months before the attack. Ethical Threat Insight: Surviving a Ransomware Attack A DC‑area Reddit thread described days of disruption after a hospital system was reportedly hit by Rhysida ransomware. How much was the ransom? ~$3 million USD at the time of the incident. 😲 It’s a painful, real‑world reminder: your ability to operate “offline” is the difference between chaos and continuity. The time to have a plan and to prepare is before the proverbial SHTF. 6 ways to prepare...

3 signs your pentest was a paperweight - go.spenceralessi.com

Who you choose to test your environment matters just as much as what they test. Ethical Threat Insight: Internal Pentest Report Red Flags If you know a little bit about me, you know internal pentesting is kind of my thing. I’ve done more than 120 internal pentests in the last 5 years. What I have come to realize is that not all internal pentests are created equal, especially when it comes to reporting. Most internal pentest reports look impressive at first glance, but after you dig into them...