Skip to main content
Version: 1.4.0

Windows User Type

Security User Classification ASIM Compliance

Synopsis

A Windows security processor that classifies user accounts based on username patterns and Security Identifier (SID) analysis following ASIM standards, distinguishing between regular users, administrators, services, machine accounts, and system accounts for enhanced security analysis.

Schema

- windows_user_type:
username_field: <ident>
sid_field: <ident>
target_field: <ident>
description: <text>
if: <script>
ignore_failure: <boolean>
ignore_missing: <boolean>
on_failure: <processor[]>
on_success: <processor[]>
tag: <string>

Configuration

The following fields are used to define the processor:

FieldRequiredDefaultDescription
username_fieldY-Field containing the Windows username
sid_fieldY-Field containing the Windows SID
target_fieldNusername_fieldField to store the user type classification
descriptionN-Explanatory note
ifN-Condition to run
ignore_failureNfalseContinue if classification fails
ignore_missingNfalseContinue if source fields don't exist
on_failureN-See Handling Failures
on_successN-See Handling Success
tagN-Identifier

Details

The processor analyzes Windows user accounts using both username patterns and SID structures to provide accurate user type classification. SID analysis takes priority over username patterns for more reliable identification.

note

The processor follows ASIM standards for Windows user type classification, ensuring compatibility with Azure Sentinel and Windows security monitoring systems.

SID-based classification uses well-known SID patterns and prefixes to identify system accounts, services, and domain accounts. Username pattern analysis provides additional context for accounts that don't match specific SID patterns.

User type classification includes Regular users, Admin accounts, Service accounts, Machine accounts, System accounts, Guest accounts, and Anonymous accounts for comprehensive Windows security analysis.

warning

Both username and SID fields are required for accurate classification. Missing SID information may result in less precise user type detection.

Examples

Domain Administrator Detection

Identifying built-in administrator accounts...

{
"username": "Administrator",
"user_sid": "S-1-5-21-1234567890-1234567890-1234567890-500"
}
- windows_user_type:
username_field: username
sid_field: user_sid
target_field: user_type

classifies as administrator:

{
"username": "Administrator",
"user_sid": "S-1-5-21-1234567890-1234567890-1234567890-500",
"user_type": "Admin"
}

Service Account Classification

Detecting service accounts by SID...

{
"service_name": "NETWORK SERVICE",
"service_sid": "S-1-5-20",
"local_service": "LOCAL SERVICE",
"local_sid": "S-1-5-19"
}
- windows_user_type:
username_field: service_name
sid_field: service_sid
target_field: service_type
- windows_user_type:
username_field: local_service
sid_field: local_sid
target_field: local_type

identifies service accounts:

{
"service_name": "NETWORK SERVICE",
"service_sid": "S-1-5-20",
"local_service": "LOCAL SERVICE",
"local_sid": "S-1-5-19",
"service_type": "Service",
"local_type": "Service"
}

Machine Account Detection

Identifying computer accounts...

{
"computer_name": "WORKSTATION01$",
"computer_sid": "S-1-5-21-1234567890-1234567890-1234567890-1001"
}
- windows_user_type:
username_field: computer_name
sid_field: computer_sid
target_field: account_type

classifies as machine account:

{
"computer_name": "WORKSTATION01$",
"computer_sid": "S-1-5-21-1234567890-1234567890-1234567890-1001",
"account_type": "Machine"
}

System Account Classification

Detecting system-level accounts...

{
"system_account": "SYSTEM",
"system_sid": "S-1-5-18"
}
- windows_user_type:
username_field: system_account
sid_field: system_sid
target_field: account_classification

identifies system account:

{
"system_account": "SYSTEM",
"system_sid": "S-1-5-18",
"account_classification": "System"
}

Regular Domain User

Classifying regular domain users...

{
"domain_user": "DOMAIN\\jsmith",
"user_sid": "S-1-5-21-1234567890-1234567890-1234567890-1003"
}
- windows_user_type:
username_field: domain_user
sid_field: user_sid
target_field: user_classification

classifies as regular user:

{
"domain_user": "DOMAIN\\jsmith",
"user_sid": "S-1-5-21-1234567890-1234567890-1234567890-1003",
"user_classification": "Regular"
}

Batch User Analysis

Processing multiple Windows accounts...

{
"logon_events": [
{
"user": "Administrator",
"sid": "S-1-5-21-1234567890-1234567890-1234567890-500"
},
{
"user": "SERVER01$",
"sid": "S-1-5-21-1234567890-1234567890-1234567890-1001"
},
{
"user": "Guest",
"sid": "S-1-5-21-1234567890-1234567890-1234567890-501"
}
]
}
- foreach:
field: logon_events
processor:
windows_user_type:
username_field: _ingest._value.user
sid_field: _ingest._value.sid
target_field: _ingest._value.user_type

adds classification to each event:

{
"logon_events": [
{
"user": "Administrator",
"sid": "S-1-5-21-1234567890-1234567890-1234567890-500",
"user_type": "Admin"
},
{
"user": "SERVER01$",
"sid": "S-1-5-21-1234567890-1234567890-1234567890-1001",
"user_type": "Machine"
},
{
"user": "Guest",
"sid": "S-1-5-21-1234567890-1234567890-1234567890-501",
"user_type": "Guest"
}
]
}