-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge PR #4401 from @cyb3rjy0t - Add New O365 Related Rules
new: Disabling Multi Factor Authenication new: New Federated Domain Added update: New Federated Domain Added - Exchange --------- Co-authored-by: frack113 <[email protected]> Co-authored-by: Nasreddine Bencherchali <[email protected]>
- Loading branch information
1 parent
216a378
commit 229b70f
Showing
4 changed files
with
57 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
title: Disabling Multi Factor Authenication | ||
id: 60de9b57-dc4d-48b9-a6a0-b39e0469f876 | ||
status: experimental | ||
description: Detects disabling of Multi Factor Authencation. | ||
references: | ||
- https://research.splunk.com/cloud/c783dd98-c703-4252-9e8a-f19d9f5c949e/ | ||
author: Splunk Threat Research Team (original rule), Harjot Singh @cyb3rjy0t (sigma rule) | ||
date: 2023/09/18 | ||
tags: | ||
- attack.persistence | ||
- attack.t1556 | ||
logsource: | ||
service: audit | ||
product: m365 | ||
detection: | ||
selection: | ||
Operation|contains: 'Disable Strong Authenication.' | ||
condition: selection | ||
falsepositives: | ||
- Unlikely | ||
level: high |
29 changes: 29 additions & 0 deletions
29
rules/cloud/m365/microsoft365_new_federated_domain_added_audit.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
title: New Federated Domain Added | ||
id: 58f88172-a73d-442b-94c9-95eaed3cbb36 | ||
related: | ||
- id: 42127bdd-9133-474f-a6f1-97b6c08a4339 | ||
type: similar | ||
status: experimental | ||
description: Detects the addition of a new Federated Domain. | ||
references: | ||
- https://research.splunk.com/cloud/e155876a-6048-11eb-ae93-0242ac130002/ | ||
- https://o365blog.com/post/aadbackdoor/ | ||
author: Splunk Threat Research Team (original rule), Harjot Singh @cyb3rjy0t (sigma rule) | ||
date: 2023/09/18 | ||
tags: | ||
- attack.persistence | ||
- attack.t1136.003 | ||
logsource: | ||
service: audit | ||
product: m365 | ||
detection: | ||
selection_domain: | ||
Operation|contains: 'domain' | ||
selection_operation: | ||
Operation|contains: | ||
- 'add' | ||
- 'new' | ||
condition: all of selection_* | ||
falsepositives: | ||
- The creation of a new Federated domain is not necessarily malicious, however these events need to be followed closely, as it may indicate federated credential abuse or backdoor via federated identities at a similar or different cloud provider. | ||
level: medium |
9 changes: 6 additions & 3 deletions
9
...crosoft365_new_federated_domain_added.yml → ...5_new_federated_domain_added_exchange.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters