4.2 days
Median time from initial access to first lateral movement in enterprise intrusions, per Mandiant M-Trends 2025
87%
Of ransomware intrusions involve Active Directory compromise before detonation
7
Core Windows Event IDs that cover the majority of credential-based lateral movement techniques
60%
Of lateral movement detections come from authentication log analysis, not endpoint telemetry

Active Directory is the skeleton of every Windows enterprise network and the primary objective of attackers who have gained initial access. Credential harvesting, ticket forgery, and authentication relay attacks let adversaries move from a compromised endpoint to domain controller in hours. The detection challenge is not a lack of log data — Windows generates authentication events at enormous volume — but separating the signal from the noise at scale.

This guide is written for detection engineers and SOC leads who need to build or improve lateral movement coverage. We cover the specific Event IDs that matter, the credential attack techniques they map to, Sigma rule patterns that translate across SIEM platforms, and the tuning strategies that make these detections actionable rather than just loud.

The Seven Windows Event IDs That Cover Most Lateral Movement

Windows audit logging, when properly configured, produces reliable signals for the most common credential-based lateral movement techniques. The problem is that default audit policy settings in most organizations log too little or log the wrong events. Start by confirming these audit subcategories are enabled via Group Policy: Audit Logon/Logoff, Audit Account Logon, Audit Kerberos Service Ticket Operations, and Audit Kerberos Authentication Service.

The seven Event IDs that form the foundation of lateral movement detection coverage are: 4624 (successful logon — the baseline; filter on Logon Type 3 for network logons and Type 10 for remote interactive); 4625 (failed logon — source of brute force and credential spray signals); 4648 (logon using explicit credentials — surfaces Pass-the-Hash and RunAs abuse); 4768 (Kerberos TGT requested — baseline for Kerberoasting and AS-REP roasting detection); 4769 (Kerberos service ticket requested — the primary Kerberoasting detection event, filter on encryption type 0x17 for RC4 requests); 4771 (Kerberos pre-authentication failed — failed TGT requests indicating credential spray against Kerberos); and 4776 (NTLM authentication — surfaces NTLM relay and hash-based authentication outside expected paths).

None of these events are useful in isolation. The detection value comes from correlating sequences across time windows and filtering against baseline behavior.

Event ID 4624 — Logon Type 3 (Network)

Lateral movement almost always produces Type 3 network logons from unexpected source machines. Baseline normal source-to-destination pairs and alert on first-seen combinations.

Event ID 4768/4769 — Kerberos Tickets

Kerberoasting produces 4769 events with RC4 encryption (type 0x17) against service accounts. A spike in these from a single source in a short window is high-confidence Kerberoasting.

Event ID 4648 — Explicit Credential Logon

Pass-the-Hash and lateral movement via PsExec frequently generate 4648 events. Correlate with 4624 Type 3 from the same source within seconds.

Event ID 4776 — NTLM Credential Validation

NTLM relay attacks produce 4776 events on domain controllers. NTLM authentication from internet-facing systems to internal resources is an immediate escalation indicator.

Detecting Pass-the-Hash and Pass-the-Ticket

Pass-the-Hash (PtH) and Pass-the-Ticket (PtT) are the two most common credential reuse techniques in enterprise intrusions. Both bypass password requirements by replaying credential material harvested from memory, making them invisible to password-based controls.

Pass-the-Hash detection relies on identifying NTLM authentication events that originate from unexpected source machines. The primary signal is Event ID 4624 with Logon Type 3 (network) or Type 9 (NewCredentials), where the source account and source machine combination has no historical baseline. Supplement with Event ID 4648, which fires when explicit credentials are passed programmatically. In environments that have suppressed NTLM in favor of Kerberos, any 4776 event from a workstation is immediately suspicious.

Pass-the-Ticket detection looks for Kerberos ticket use from machines where the ticket was not originally issued. Event ID 4769 (service ticket request) combined with anomalous source IP relative to the account's home subnet is the primary signal. Golden Ticket attacks produce 4769 events with unusually long ticket lifetimes and missing 4768 (TGT request) events that should precede them — a correlation detectable in SIEM platforms with multi-event rule support.

For both techniques, endpoint telemetry from EDR platforms provides the strongest signal: process access to lsass.exe (Event ID 10 in Sysmon), LSASS memory reads from unexpected processes, and registry access to SAM hive locations are all behavioral indicators that precede credential reuse.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Sigma Rule Patterns for Active Directory Lateral Movement

Sigma rules are the most portable format for AD lateral movement detection because they compile to SPL (Splunk), KQL (Sentinel/Elastic), and other SIEM query languages from a single definition. The following patterns cover the highest-value detection opportunities.

For Kerberoasting detection, the rule targets Event ID 4769 with TicketEncryptionType 0x17 (RC4) and a non-machine account name, with a threshold of more than five events from a single source within 10 minutes. For Pass-the-Hash, the rule correlates Event ID 4624 with LogonType 3 and AuthenticationPackageName NTLM, filtered to exclude known service accounts and machine accounts, alerting on source machines that have not previously authenticated to the target.

For lateral movement via PsExec and similar tools, Sysmon Event ID 13 (registry value set) targeting the HKLM\SYSTEM\CurrentControlSet\Services path combined with Event ID 7045 (new service installed) from the Security log, where the service binary path contains admin shares (C$, ADMIN$), provides high-fidelity detection with low false positive rates in environments where PsExec is not legitimately used.

SigmaHQ maintains a production-quality rule set at github.com/SigmaHQ/sigma. The rules/windows/builtin/security/ and rules/windows/builtin/system/ directories contain the most relevant AD lateral movement detections. Clone the repository and convert rules using sigma-cli with the backend matching your SIEM rather than writing detection logic from scratch.

Tuning Strategies to Reduce False Positives

The reason most organizations have poor lateral movement detection coverage is not a lack of rules — it is alert fatigue from untuned rules that fire hundreds of times per day. A rule that cannot be acted upon within 15 minutes of firing has no security value.

The most effective tuning approach is building allowlists from historical baseline data before enabling alerting. For Event ID 4769 RC4 Kerberoasting rules, run the detection query against 30 days of historical logs. Every account and service that legitimately generates RC4 tickets (legacy applications, service accounts with pre-Windows 2008 SPNs) should be added to the allowlist before the rule goes live. This converts a rule that fires 500 times per day into one that fires 3 times per day on genuinely anomalous activity.

For Pass-the-Hash detection, baseline source-to-destination authentication pairs using 14 days of authentication logs. Any pair with more than 5 prior occurrences is normal behavior. Alert only on first-seen pairs involving privileged accounts or tier-0 infrastructure.

Use time-based suppression for service account activity that legitimately generates high volumes: backup agents, monitoring tools, and vulnerability scanners all produce NTLM and Kerberos events at high rates during scheduled windows. Suppress known sources during their scheduled operation windows and alert on out-of-window activity from the same sources.

BloodHound for Proactive Lateral Movement Path Analysis

Detection is reactive by definition. BloodHound Community Edition gives defenders the same attack path analysis capability that adversaries use to plan lateral movement — letting you identify and eliminate the highest-value paths before they are exploited.

BloodHound ingests Active Directory data via SharpHound (a .NET collector) and builds a graph of every permission relationship, group membership, and delegation that could be leveraged for privilege escalation or lateral movement. The Shortest Paths to Domain Admin query surfaces the attack path an adversary with any given foothold would use to reach domain administrator.

For defenders, the practical value of BloodHound is prioritized hardening: instead of trying to harden every misconfiguration, identify the 20 relationships that appear in the most attack paths and eliminate them. Common findings include nested group membership granting excessive access, constrained delegation misconfigurations, ACL-based paths through service accounts, and AdminSDHolder permission inheritance issues.

Run BloodHound on a quarterly basis or after major Active Directory changes. Treat any path that reaches Domain Admin in fewer than four hops as a critical remediation item. Establish a baseline graph and track path count reduction as a program metric.

The bottom line

Lateral movement detection in Active Directory requires three things working together: comprehensive audit log collection (the seven Event IDs, properly configured), correlation rules tuned against your baseline (not generic rules applied raw), and proactive path analysis with BloodHound to eliminate the attack paths before they are used. Start with Kerberoasting detection via Event ID 4769 filtering — it has the best signal-to-noise ratio and maps directly to a high-value attacker technique. Layer Pass-the-Hash detection once you have 30 days of authentication baselines to suppress false positives. Run BloodHound quarterly to measure and reduce your attack surface.

Frequently asked questions

What Windows audit policies must be enabled to detect lateral movement?

At minimum, enable these audit subcategories via Group Policy: Audit Logon/Logoff (success and failure), Audit Account Logon (success and failure), Audit Kerberos Service Ticket Operations (success and failure), and Audit Kerberos Authentication Service (success and failure). For comprehensive coverage, also enable Audit Detailed Tracking (to capture process creation via Event ID 4688), and deploy Sysmon with a curated configuration (SwiftOnSecurity or Olaf Hartong's modular config) to capture process access, network connections, and registry events that Windows native audit does not log.

How do I detect Golden Ticket and Silver Ticket attacks?

Golden Ticket attacks forge Kerberos TGTs and leave distinctive artifacts: Event ID 4769 service ticket requests that are missing a preceding 4768 TGT request, accounts authenticating from multiple source IPs simultaneously, and ticket lifetimes that exceed your domain's maximum ticket age policy. Silver Ticket attacks are harder to detect because they do not touch the domain controller — they forge service tickets locally. The primary detection vector is Sysmon network connection events from unexpected processes to service principals, and endpoint telemetry showing LSASS memory access prior to unusual service ticket use.

What is Kerberoasting and how do I detect it?

Kerberoasting is a technique where an attacker with any authenticated domain account requests Kerberos service tickets for accounts with Service Principal Names (SPNs) registered. The tickets are encrypted with the service account's password hash and can be cracked offline. Detection focuses on Event ID 4769 filtered to RC4 encryption type (0x17), because legitimate Kerberos in modern environments uses AES encryption. A single source requesting RC4 tickets for multiple service accounts within minutes is high-confidence Kerberoasting. Remediation combines detection with mitigation: use Managed Service Accounts (MSAs) or Group Managed Service Accounts (gMSAs) to eliminate crackable password hashes on service accounts.

How does PsExec lateral movement appear in Windows logs?

PsExec lateral movement generates a distinctive multi-event sequence: the PSEXESVC service is created on the target system (Event ID 7045 in the System log), a network logon occurs from the source machine (Event ID 4624 Type 3), and file creation events appear in the ADMIN$ share. Sysmon Event ID 11 (file creation) in the Windows directory from a remote source, combined with Event ID 13 (registry modification) creating the service entry, provides the highest-fidelity PsExec detection. False positives from legitimate admin tools using similar mechanisms can be suppressed by allowlisting known IT management source IPs.

What is the difference between Pass-the-Hash and Overpass-the-Hash?

Pass-the-Hash reuses an NTLM hash directly to authenticate to services that accept NTLM, without needing the plaintext password. Overpass-the-Hash (also called Pass-the-Key) takes an NTLM hash and uses it to request a Kerberos TGT, converting the NTLM credential into a Kerberos ticket that can then be used across the network. Overpass-the-Hash is preferred by attackers in environments that have restricted NTLM, because it produces Kerberos traffic that blends with normal authentication patterns. Detection requires correlating TGT requests (Event ID 4768) with the source machine's authentication history to identify anomalous ticket requests.

How often should I run BloodHound against my Active Directory environment?

Run a full BloodHound collection quarterly as a baseline measurement, and after any significant Active Directory change: new domain trust relationships, bulk user or group modifications, service account creation, or delegation changes. In organizations with active AD security programs, monthly collection provides better change tracking. Track the number of attack paths to Domain Admin over time as a program health metric — a declining path count indicates effective hardening. Some organizations also run BloodHound as part of their change management process, collecting before and after any privileged configuration change to verify it did not introduce new attack paths.

Sources & references

  1. MITRE ATT&CK — Lateral Movement (TA0008)
  2. Microsoft — Windows Security Audit Events Reference
  3. SigmaHQ — Sigma Rules Repository
  4. SpecterOps — BloodHound Community Edition
  5. CISA — Detecting and Mitigating Active Directory Compromises

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.