
5 credential access detection rules beyond LSASS — KQL + Sigma, production-ready
Every detection program starts with LSASS dump detection. Most stop there.
The problem: an attacker who hits ASR LSASS protection, PPL, or Credential Guard pivots to techniques that never touch LSASS. Kerberoasting, DCSync, SAM hive extraction, and DPAPI abuse each target a different credential store, generate different telemetry, and need a different rule. If you only detect LSASS access, you detect only the attacker who didn't adapt.
I wrote up the 5 credential access techniques we see most often in real environments, with the actual KQL and Sigma rules for each:
1. LSASS memory access — filtering on GrantedAccess mask (0x1010 vs 0x1000) instead of process name. Process name exclusions break on renamed binaries. The access mask doesn't lie.
2. Kerberoasting — Event ID 4769 with encryption type 0x17 (RC4). Legitimate Kerberos uses AES. A burst of RC4 TGS requests from one source = Kerberoasting. Threshold: >3 unique services in 5 minutes.
3. DCSync — Event ID 4662 with the three replication GUIDs, from a non-DC. This is near-zero false positive if you maintain a DC allowlist. Any non-DC requesting DS-Replication-Get-Changes is a confirmed incident.
4. SAM/NTDS extraction — command-line patterns: reg save targeting SAM/SECURITY/SYSTEM hives, ntdsutil IFM creation, vssadmin create shadow, esentutl copying ntds.dit. DeviceProcessEvents with ProcessCommandLine matching.
5. DPAPI secrets — the one nobody covers. Browser passwords, WiFi creds, RDP saved passwords are all DPAPI-protected and all extractable without touching LSASS. Credential Guard doesn't protect DPAPI. Monitor access to %APPDATA%\Microsoft\Protect\ by non-system processes.
Full writeup with copy-paste KQL, a Sigma rule for Kerberoasting, MDE IdentityQueryEvents alternatives (for environments without DC log forwarding), and false positive analysis for each:
https://training.ridgelinecyber.com/blog/credential-access-detection-beyond-lsass/
Happy to answer questions on any of the rules or tuning approaches.