Our admin accounts are part of the protected users group, which prevents them from authenticating via NTLM. When an admin connects to a host via RDP, the system first attempts NTLM authentication before heading to Kerberos. This behavior triggers an alert in our SIEM.
Do you have any suggestions on how to adjust the rule to prevent this alert from occurring?
Best regards,
Klaus
Would probably need a little more info on this... but from the above ..
I believe you are probably seeing a 4625 event with a "Reason for Error" populated with "The user is a member of a protected group and must authenticate with Kerberos" ?
Or simply a 4625 event with "Login failed - Unknown user name or bad password.", with the Authentication Method set to "NTLM"
If you have LDAP discovery enabled, your CMDB will contain the "Protected Users" group and membership... so you could look to clone the rule to exclude in the "logon failure" sub pattern, users that are in the Protected Users group AND authentication method = NTLM.
Welcome to your new Fortinet Community!
You'll find your previous forum posts under "Forums"
User | Count |
---|---|
72 | |
25 | |
15 | |
10 | |
10 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.