Feb. 5, 2024, 9:54 p.m. | /u/bogisbuncenbean

For [Blue|Purple] Teams in Cyber Defence www.reddit.com

Anyone have any killer detections they’ve created to monitor suspicious LDAP Activity in their environments? Right now we have created a baseline for what we’ve considered to be normal processes querying LDAP/LDAPS Global LDAP/S and Microsoft ADWS, and then we alert on the anomalies… but nowadays it seems like more and more applications running on Windows are using LDAP. Zoom used to be an exclusion for example, and now they have a use case??? Just wondering what others typically alert …

alert alerting applications blueteamsec detections environments fidelity global high killer ldap ldaps microsoft monitor normal processes running windows

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC