elastic / detection-rules

https://www.elastic.co/guide/en/security/current/detection-engine-overview.html
Other
1.97k stars 505 forks source link

[New Rule] Azure Modify Trusted Domains #888

Open bm11100 opened 3 years ago

bm11100 commented 3 years ago

Description

Hardening Strategies for Microsoft 365 to Defend Against UNC2452 - thanks to @dstepanic17 for sharing the whitepaper.

The Azure AD Audit log and Unified Audit log records when a domain is configured for federated authentication and the modification of federated realm objects. In most organizations, domain federation settings will be updated infrequently. Organizations should create rules to alert on the log events generated by these activities and audit them to ensure they are legitimate.

Required Info

Optional Info

Example Data

“Operation”: “Set domain authentication.” “Operation”: “Set federation settings on domain.”

austinsonger commented 3 years ago

Detection Command Line:

process.args : (*Update-MSOLFederatedDomain* OR *Update-MSOLFederatedDomain*)

OperationName

azure.auditlogs.operation_name : (“Set domain authentication.” OR “Set federation settings on domain.”)

Fields:

MITRE

Tactic Technique ID Technique Name Sub-Technique Name
Privilege Escalation T1484.002 Domain Policy Modification Domain Trust Modification
Privilege Escalation T1134 Access Token Manipulation
botelastic[bot] commented 3 years ago

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.