Customize Trail Flow Queries

The Trail Flow allows you to extend Tenable Identity Exposure capabilities beyond the default monitoring of Indicators of Exposure and Indicators of Attack. You can create custom queries to retrieve data quickly and also use the query as a custom alert that Tenable Identity Exposure can send to your Security Information and Event Management (SIEM). 

The following examples show practical custom queries in Tenable Identity Exposure.

Use Case Description
GPO Startup and Shutdown binaries and Global SYSVOL path monitoring Monitors for scripts in the boot startup path and/or the Global SYSVOL replication path. Attackers often use these scripts to abuse native AD services to proliferate ransomware quickly across an environment.
  • Scripts in startup path query:

    globalpath: "sysvol" AND types: "Scriptsini"

    Note: Here, types refer to the object attribute and not the column header.
  • SYSVOL monitoring query:

    globalpath:"sysvol" AND (globalpath:".ps1" OR globalpath:".msi" OR globalpath:".bat" OR globalpath:".exe")

Modifications of GPO Configuration Monitors for modifications to GPO configurations. Attackers often use this method to downgrade security settings to aid in persistence and/or account takeover.
  • GPO monitoring query:

    gptini-displayname:"New Group Policy Object" AND changetype:"Changed"

Failed Authentication and Password Reset

Monitors for multiple failed attempts to authenticate resulting in a lockout, which can act as an early warning flag for brute-force attempts.

Note: You must set the lockout policy and date/time variables. For more information, see Authentication Using a Tenable Identity Exposure Account.
  • Failed authentication query: 

    useraccountcontrol:"Normal" AND badpwdcount:"<ACCOUNT_LOCKOUT_THRESHOLD>" AND badpasswordtime:"<DATE_TIME_STAMP>"

  • Password reset query:

    pwdlastset:"<DATE_TIME_STAMP"

Object Permissions Added, Removed, or Changed

Monitors for unauthorized modifications to ACL rights and related object permission sets. Attackers abuse this method to elevate permissions. 

Note: You must supply the date/time variable.
  • Object permissions query: 

    ntsecuritydescriptor:0 AND whenchanged:"DATE_TIME_STAMP"

Changes to Admins Resulting in a Deviance

Built-in Administrative groups and custom groups are sensitive groups that require close monitoring for deviances or configuration changes that can introduce risk. This query lets you quickly review recent changes that could have adversely affected security settings within the admins group.

  • Changes to Admins query:

    isDeviant:true AND cn:"admins"

See also