Windows User Type
Synopsis
A Windows security processor that classifies user accounts based on username patterns and Security Identifier (SID) analysis following ASIM standards, distinguishing between regular users, administrators, services, machine accounts, and system accounts for enhanced security analysis.
Schema
- windows_user_type:
username_field: <ident>
sid_field: <ident>
target_field: <ident>
description: <text>
if: <script>
ignore_failure: <boolean>
ignore_missing: <boolean>
on_failure: <processor[]>
on_success: <processor[]>
tag: <string>
Configuration
The following fields are used to define the processor:
Field | Required | Default | Description |
---|---|---|---|
username_field | Y | - | Field containing the Windows username |
sid_field | Y | - | Field containing the Windows SID |
target_field | N | username_field | Field to store the user type classification |
description | N | - | Explanatory note |
if | N | - | Condition to run |
ignore_failure | N | false | Continue if classification fails |
ignore_missing | N | false | Continue if source fields don't exist |
on_failure | N | - | See Handling Failures |
on_success | N | - | See Handling Success |
tag | N | - | Identifier |
Details
The processor analyzes Windows user accounts using both username patterns and SID structures to provide accurate user type classification. SID analysis takes priority over username patterns for more reliable identification.
The processor follows ASIM standards for Windows user type classification, ensuring compatibility with Azure Sentinel and Windows security monitoring systems.
SID-based classification uses well-known SID patterns and prefixes to identify system accounts, services, and domain accounts. Username pattern analysis provides additional context for accounts that don't match specific SID patterns.
User type classification includes Regular users, Admin accounts, Service accounts, Machine accounts, System accounts, Guest accounts, and Anonymous accounts for comprehensive Windows security analysis.
Both username and SID fields are required for accurate classification. Missing SID information may result in less precise user type detection.
Examples
Domain Administrator Detection
Identifying built-in administrator accounts... |
|
classifies as administrator: |
|
Service Account Classification
Detecting service accounts by SID... |
|
identifies service accounts: |
|
Machine Account Detection
Identifying computer accounts... |
|
classifies as machine account: |
|
System Account Classification
Detecting system-level accounts... |
|
identifies system account: |
|
Regular Domain User
Classifying regular domain users... |
|
classifies as regular user: |
|
Batch User Analysis
Processing multiple Windows accounts... |
|
adds classification to each event: |
|