elastic / detection-rules

https://www.elastic.co/guide/en/security/current/detection-engine-overview.html
Other
1.92k stars 492 forks source link

[New Rule] New Microsoft 365 Impossible Travel Rules and Deprecation #4054

Closed terrancedejesus closed 1 month ago

terrancedejesus commented 1 month ago

Pull Request

Issue link(s):

Summary - What I changed

Added 2 new prebuilt OOTB detection rules for Microsoft 365 integration related to impossible travel activity. Also deprecated a rule as it is no longer applicable based on Defender changes to Microsoft 365 customers. Please see related issue for more details regarding this.

Note: While it is straight-forward to identify impossible travel, identifying valid account compromise at login regardless of time are a bit more challenging, therefore the New Terms rule has been added to at least alert when any new country is logged from. This logic could be adjusted to be more region or city focused, but to reduce noise, country was selected.

How To Test

Screenshot 2024-09-04 at 12 58 25 PM

Query has been tested to match login behavior. Rules are threshold and new terms in order to identify logins from 2 separate locations within a 15 minute window of eachother and any time an unusual region appears as the source for a user login.

Checklist

Contributor checklist

protectionsmachine commented 1 month ago

Rule: New - Guidelines

These guidelines serve as a reminder set of considerations when proposing a new rule.

Documentation and Context

Rule Metadata Checks

New BBR Rules

Testing and Validation