Skip to content

Commit 5792223

Browse files
committed
Updated readme to mention that Microsoft Defender for Identity now detects this based on bad guess count
1 parent 680e316 commit 5792223

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

readme.MD

+3-2
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,9 @@ ldapnomnom --output rootDSEs.json --dump
5151

5252
## Detection
5353

54-
- No Windows event logs are generated (tested on Windows 2016 / 2019)
55-
- Requires custom network level monitoring (unencrypted LDAP analysis or traffic volume for LDAPS)
54+
- Nothing native in the Windows event logs are generated (tested on Windows 2016 / 2019)
55+
- Microsoft Defender for Identity 2.228 (February 2024) adds [event ID 2437](https://learn.microsoft.com/en-us/defender-for-identity/reconnaissance-discovery-alerts#account-enumeration-reconnaissance-ldap-external-id-2437-preview) and is triggered if the number of failed requests (i.e. wrong guesses at usernames) crosses an unknown threshold
56+
- Custom network level monitoring (unencrypted LDAP analysis or traffic volume for LDAPS) can also be used, though it's not reliable
5657

5758
## Mitigation
5859

0 commit comments

Comments
 (0)