Group policy enables the centralized management of computer and user accounts by IT administrators. A group policy is a group of settings that can be applied to multiple users and machines. A group policy object (GPO) is a compilation of policy settings, both computer-related and user-related, that define the behavior of computers and users respectively in an Active Directory environment.
Privilege escalation occurs when an adversary gains unauthorized access by exploiting vulnerabilities, misconfigurations, bugs, etc. to launch a cyberattack. One of the common techniques of a privilege escalation attack is group policy modification. Often categorized as a sub-technique under domain policy modification, group policy modification involves modifying group policy objects to bypass discretionary access controls as a means to execute privilege escalation. All user accounts are allowed to read group policy objects in a domain, by default. However, GPO access control permissions can be assigned to specific users or groups in a domain.
An adversary can cause malicious attacks through modification of GPOs. Here are a few examples:
A few examples of tools and adversary groups that have a history with GPO modifications are:
Group policy modifications can be monitored and detected using event logs on directory service. A few examples of modifications can be found as follows:
In general, group policy modifications might come with other behavior anomalies. In some cases, this could be an instance of a scheduled task. These anomalies can be searched for within events that are registered with new logon privileges.
Group policy modification can be restored using techniques such as auditing and user account management.
Zoho Corporation Pvt. Ltd. All rights reserved.