Skip to content

Classification Rules

What Classification Rules Do

Classification rules automatically tag discovered accounts with labels (e.g., Admin Account, Service Account, Suspicious Account) based on account attributes. Classifications are used throughout Hydden to filter reports, scope mapping rules, and drive threat detection. Each classification rule defines a query field, operator, and value to match against account data.

On the Classification Rules page, tenant owners can create and edit Account Classifications and Classification Rules.

Classification Rules page

The page provides two configuration workflows. One to setup Classifications and the other to define Classification Rules.

Add Classification

Hydden provides the following default classifications:

  • Admin Account
  • Custom Account
  • CVE-based classifications:
    • CVE-2023-42793
    • CVE-2024-37085
  • Known Bad Account
  • Privileged Account
  • Service Account
  • Suspicious Account

Use the + Add Classification button to add your own classifications.

CVE Classifications

CVE-Based Detection

Hydden includes built-in classifications for known CVE vulnerabilities:

  • CVE-2023-42793 — JetBrains TeamCity authentication bypass. The KRTBGT-based classification rules identify Active Directory accounts with naming patterns associated with this exploit.
  • CVE-2024-37085 — VMware ESXi Active Directory integration vulnerability. The VMware vSphere Admin classification rules detect admin accounts in environments that may be affected.

These classifications pair with corresponding classification rules to automatically flag at-risk accounts.

Add Classification Rules

By default, Hydden provides the following Classification rules:

  • Accounts by Display Name
  • Accounts by Email
  • Accounts by Name
  • Accounts by UPN
  • Member of Privileged Group
  • Service Account by Path/OU
  • Service Account by Type
  • Active Directory Accounts with a name of KRTBGT
  • Active Directory Accounts with a name of KRTBGT (CVE)
  • Privileged Account
  • VMware vSphere Admin Accounts
  • VMware vSphere Admin Accounts (CVE)

Use the + Add Classification Rule button to add your own classification rules. Use the Edit button to edit existing rules. Use the Rule Matches button to view data that is matching the specific rule.

Add classification rule modal

Purpose: Create a custom classification rule to automatically tag accounts based on their attributes.

  1. Give your rule a Name.
  2. Optionally from the Data Source drop-down, select a data source this rule should apply to.
  3. From the Query field, select which query to use for this rule. See Available Query Fields for the full list.
  4. From the Operator field, select Contains, Starts with, Ends with, or Equals.
  5. In the Value field, enter which value, prefix, suffix, or term to match.
  6. From the Classification field, select the classification for this rule.
  7. Click Add.

Available Query Fields

The following fields are available for use in classification rule queries:

Query FieldDescription
PathThe account's organizational unit or directory path
NameThe account's name (sAMAccountName or equivalent)
TypeThe account type (User, Service, Resource, etc.)
Display NameThe account's display name
UPNThe account's User Principal Name
EmailThe account's primary email address
TitleThe account holder's job title
DepartmentThe account holder's department
IsPrivilegedWhether the account has privileged access (true/false)
Custom1–Custom10Custom attribute fields 1 through 10
Employee IDThe account holder's employee identifier
Group NameThe name of a group the account belongs to

Rule Flags

Classification rules support the following optional flags:

FlagDescription
Is AlertWhen enabled, the rule triggers an alert notification when a matching account is found
Is RepeatableWhen enabled, the rule can trigger multiple times for the same account across collection runs
Allow Workflow TriggerWhen enabled, the rule can initiate automated workflows configured in the Integrate section

Account Classification Report

The Classification Rules come with an out of the box report in the Search Library on the Identity & Account tile:

  • Account Classifications

Account Classification report

The Account Classification Report in the Search Library shows the following columns by default:

  • Classification
  • Classification Rule
  • Platform
  • Data Source
  • Domain
  • Provider
  • Type
  • Account Name
  • Mapped to
  • Display Name
  • Email
  • UPN
  • MFA
  • Status

The Path column, which can be added via the Columns button, provides visibility into Path/OU value details required to set up a custom Path/OU classification.

Hydden Documentation and Training Hub