IR-010endpointv1.0.0
Privilege Escalation Detection and Response
⚠️ high⚠️ critical
⏱ Est. Time30m
📋 Steps10 steps
🔧 Tools5 required
🔗 Integrations5 platforms
📊 Avg Resolution60m
🔧 Tools Required
edrsiemidentity providerpam solutionactive directory
⚡ Triggers
edr_privilege_escalation_alertsiem_admin_group_changesiem_sudo_to_root_anomalywindows_event_4672windows_event_4673ad_group_membership_changesiem_uac_bypass_technique
🔌 Integrations
req
crowdstrike falcon
Privilege escalation behavioral detection and process tree analysis
opt
microsoft defender for endpoint
Alternative EDR — Windows-native privilege escalation detection
req
splunk
Windows Event Log correlation, AD event monitoring
opt
cyberark pam
Privileged Access Management — session recording and credential vaulting
req
azure active directory
Azure AD / on-prem AD — group membership and role assignment audit
Click each step to expand the full procedure, automation hints, and expected outputs.