New Local Administrator Account Created (E8-05 Restrict Admin Privileges)

E8-05 — Restrict Administrative Privileges ML1 high experimental
More E8-05 rules
Description
Detects a user being added to the local Administrators group (EventID 4732). Adversaries create backdoor admin accounts for persistence after initial compromise. E8-05 requires that local admin accounts be managed, documented, and reviewed — any unexpected addition to Administrators warrants immediate review. For higher fidelity, correlate with EventID 4720 (account creation) within 5 minutes using your SIEM's correlation engine to detect the full create-then-escalate sequence.
Rule Source (Sigma YAML)
title: New Local Administrator Account Created (E8-05 Restrict Admin Privileges)
id: 8a0d5ec1-da31-4493-a775-e11c074fa643
status: experimental
description: |
    Detects a user being added to the local Administrators group (EventID 4732).
    Adversaries create backdoor admin accounts for persistence after initial compromise.
    E8-05 requires that local admin accounts be managed, documented, and reviewed —
    any unexpected addition to Administrators warrants immediate review.

    For higher fidelity, correlate with EventID 4720 (account creation) within 5
    minutes using your SIEM's correlation engine to detect the full create-then-escalate
    sequence.
references:
    - https://attack.mitre.org/techniques/T1136/001/
    - https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model
author: Roni Biju
date: 2026-03-09
modified: 2026-03-09
tags:
    - e8.control.05
    - e8.maturity.ml1
    - attack.persistence
    - attack.t1136.001
logsource:
    product: windows
    service: security
detection:
    selection:
        EventID: 4732
        TargetUserName|contains: 'Administrators'
    filter_known_system:
        SubjectUserName:
            - 'SYSTEM'
            - 'LOCAL SERVICE'
            - 'NETWORK SERVICE'
    condition: selection and not filter_known_system
falsepositives:
    - Authorised IT provisioning scripts creating break-glass accounts
    - Software installers that create service accounts
level: high
custom:
    e8_control: E8-05
    e8_maturity: ML1
    e8_bypass_technique: Backdoor local admin account for persistence
    false_positive_rate: low
    tuning_notes: |
        Correlate SubjectUserName (who made the change) against your ITSM/change
        management system. Any creation outside a documented change window is
        high-confidence. Consider near-realtime alerting for this rule.
Tuning Notes
Correlate SubjectUserName (who made the change) against your ITSM/change management system. Any creation outside a documented change window is high-confidence. Consider near-realtime alerting for this rule.
E8 Control
Min. Maturity
ML1
Severity
high
FP Rate
low
Log Source
windows / security
Rule ID
8a0d5ec1-da31-4493-a775-e11c074fa643
File
rules/e8-05-restrict-admin/e8_05_new_local_admin_account.yml
Bypass Technique
Backdoor local admin account for persistence
ATT&CK Techniques
False Positives
  • Authorised IT provisioning scripts creating break-glass accounts
  • Software installers that create service accounts