← Back to SOC feed Coverage →

NTDS.DIT Created

sigma LOW SigmaHQ
T1003.003
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

The creation of the NTDS.DIT file indicates potential unauthorized access or modification to Active Directory data, as this file is critical to directory services. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential compromise of domain controllers and sensitive directory information.

Detection Rule

Sigma (Original)

title: NTDS.DIT Created
id: 0b8baa3f-575c-46ee-8715-d6f28cc7d33c
status: test
description: Detects creation of a file named "ntds.dit" (Active Directory Database)
references:
    - Internal Research
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-05-05
tags:
    - attack.credential-access
    - attack.t1003.003
logsource:
    product: windows
    category: file_event
detection:
    selection:
        TargetFilename|endswith: 'ntds.dit'
    condition: selection
falsepositives:
    - Unknown
level: low

KQL (Azure Sentinel)

imFileEvent
| where TargetFileName endswith "ntds.dit"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_ntds_dit_creation.yml