Hello devs,
I believe you need to expand the scope of your current rule setup to correlate events for username fields specifically, rather than only globally or for a single user. I made an adjustment to the rule to shared to match the same field attribute so when a specific user attempts the password change within that period, the rule is triggered.
<rule id="100189" level="3">
<if_group>windows</if_group>
<field name="win.system.eventID">^4723$</field>
<description>Password changed for account $(win.eventdata.targetUserName)</description>
<options>no_full_log</options>
</rule>
<rule id="100190" level="12" frequency="5" timeframe="28800">
<if_matched_sid>100189</if_matched_sid>
<same_field>win.eventdata.targetUserName</same_field>
<description>Excessive password changes detected for user $(win.eventdata.targetUserName) in 8 hours</description>
</rule>
Please let me know if you require further clarification or assistance on this.
Regards,