wagov / WASOCAutomationPlaybook

For testing playbooks
1 stars 2 forks source link

WASOC Automation Rules

Use the following deploy button to deploy the paired automation rules for the WASOC Analytic Rule package: Rule Name Deploy Rule
Complete Automation Rule Package Deploy to Azure
To add individual autmation rules, deploy each of the preferred rules below: Rule Name Deploy Rule
AddTasks - (Preview) TI map Domain entity to Dns Events (ASIM DNS Schema) Deploy to Azure
AddTasks - (Preview) TI map Domain entity to Web Session Events (ASIM Web Session schema) Deploy to Azure
AddTasks - (Preview) TI map IP entity to DNS Events (ASIM DNS schema) Deploy to Azure
AddTasks - (Preview) TI map IP entity to Network Session Events (ASIM Network Session schema) Deploy to Azure
AddTasks - (Preview) TI map IP entity to Web Session Events (ASIM Web Session schema) Deploy to Azure
AddTasks - A client made a web request to a potentially harmful file (ASIM Web Session schema) Deploy to Azure
AddTasks - A host is potentially running PowerShell to send HTTP(S) requests (ASIM Web Session schema) Deploy to Azure
AddTasks - A host is potentially running a crypto miner (ASIM Web Session schema) Deploy to Azure
AddTasks - A host is potentially running a hacking tool (ASIM Web Session schema) Deploy to Azure
AddTasks - AD FS Abnormal EKU object identifier attribute Deploy to Azure
AddTasks - Account Created and Deleted in Short Timeframe Deploy to Azure
AddTasks - Admin promotion after Role Management Application Permission Grant Deploy to Azure
AddTasks - Anomalous sign-in location by user account and authenticating application Deploy to Azure
AddTasks - Attempts to sign in to disabled accounts Deploy to Azure
AddTasks - Azure AD Role Management Permission Grant Deploy to Azure
AddTasks - Azure DevOps Personal Access Token (PAT) misuse Deploy to Azure
AddTasks - Azure Portal Signin from another Azure Tenant Deploy to Azure
AddTasks - Base64 encoded Windows process command-lines (Normalized Process Events) Deploy to Azure
AddTasks - Brute force attack against user credentials (Uses Authentication Normalization) Deploy to Azure
AddTasks - Bulk Changes to Privileged Account Permissions Deploy to Azure
AddTasks - Credential Dumping Tools - File Artifacts Deploy to Azure
AddTasks - Credential Dumping Tools - Service Installation Deploy to Azure
AddTasks - DEV-0586 Actor IOC - January 2022 Deploy to Azure
AddTasks - DNS events related to ToR proxies (ASIM DNS Schema) Deploy to Azure
AddTasks - DNS events related to mining pools (ASIM DNS Schema) Deploy to Azure
AddTasks - Detect CoreBackUp Deletion Activity from related Security Alerts Deploy to Azure
AddTasks - Dev-0228 File Path Hashes November 2021 (ASIM Version) Deploy to Azure
AddTasks - Dev-0270 WMIC Discovery Deploy to Azure
AddTasks - Discord CDN Risky File Download (ASIM Web Session Schema) Deploy to Azure
AddTasks - Dynamics 365 - User Bulk Retrieval Outside Normal Activity Deploy to Azure
AddTasks - Excessive NXDOMAIN DNS Queries (ASIM DNS Schema) Deploy to Azure
AddTasks - Excessive number of HTTP authentication failures from a source (ASIM Web Session schema) Deploy to Azure
AddTasks - Excessive number of failed connections from a single source (ASIM Network Session schema) Deploy to Azure
AddTasks - Exchange OAB Virtual Directory Attribute Containing Potential Webshell Deploy to Azure
AddTasks - Failed logon attempts in authpriv Deploy to Azure
AddTasks - First access credential added to Application or Service Principal where no credential was present Deploy to Azure
AddTasks - Insider Risk_High User Security Alert Correlations Deploy to Azure
AddTasks - Insider Risk_High User Security Incidents Correlation Deploy to Azure
AddTasks - Insider Risk_Microsoft Purview Insider Risk Management Alert Observed Deploy to Azure
AddTasks - Insider Risk_Risky User Access By Application Deploy to Azure
AddTasks - Linked Malicious Storage Artifacts Deploy to Azure
AddTasks - M2131_DataConnectorAddedChangedRemoved Deploy to Azure
AddTasks - M2131_RecommendedDatatableUnhealthy Deploy to Azure
AddTasks - MFA Rejected by User Deploy to Azure
AddTasks - Mail redirect via ExO transport rule Deploy to Azure
AddTasks - Mail.Read Permissions Granted to Application Deploy to Azure
AddTasks - Malicious Inbox Rule Deploy to Azure
AddTasks - Malware in the recycle bin (Normalized Process Events) Deploy to Azure
AddTasks - Mass Cloud resource deletions Time Series Anomaly Deploy to Azure
AddTasks - Midnight Blizzard - suspicious rundll32.exe execution of vbscript (Normalized Process Events) Deploy to Azure
AddTasks - Modified domain federation trust settings Deploy to Azure
AddTasks - Multiple RDP connections from Single System Deploy to Azure
AddTasks - Multiple users email forwarded to same destination Deploy to Azure
AddTasks - NRT Modified domain federation trust settings Deploy to Azure
AddTasks - Network Port Sweep from External Network (ASIM Network Session schema) Deploy to Azure
AddTasks - New Agent Added to Pool by New User or Added to a New OS Type. Deploy to Azure
AddTasks - New EXE deployed via Default Domain or Default Domain Controller Policies (ASIM Version) Deploy to Azure
AddTasks - Non Domain Controller Active Directory Replication Deploy to Azure
AddTasks - Office policy tampering Deploy to Azure
AddTasks - PIM Elevation Request Rejected Deploy to Azure
AddTasks - Password spray attack against ADFSSignInLogs Deploy to Azure
AddTasks - Password spray attack against Azure AD Seamless SSO Deploy to Azure
AddTasks - Password spray attack against Azure AD application Deploy to Azure
AddTasks - Port scan detected (ASIM Network Session schema) Deploy to Azure
AddTasks - Potential Build Process Compromise - MDE Deploy to Azure
AddTasks - Potential Fodhelper UAC Bypass (ASIM Version) Deploy to Azure
AddTasks - Potential Fodhelper UAC Bypass Deploy to Azure
AddTasks - Potential Password Spray Attack (Uses Authentication Normalization) Deploy to Azure
AddTasks - Potential communication with a Domain Generation Algorithm (DGA) based hostname (ASIM Web Session schema) Deploy to Azure
AddTasks - Powershell Empire Cmdlets Executed in Command Line Deploy to Azure
AddTasks - Prestige ransomware IOCs Oct 2022 Deploy to Azure
AddTasks - Probable AdFind Recon Tool Usage (Normalized Process Events) Deploy to Azure
AddTasks - Rare RDP Connections Deploy to Azure
AddTasks - Rare application consent Deploy to Azure
AddTasks - SUNBURST and SUPERNOVA backdoor hashes (Normalized File Events) Deploy to Azure
AddTasks - SUNBURST suspicious SolarWinds child processes (Normalized Process Events) Deploy to Azure
AddTasks - Scheduled Task Hide Deploy to Azure
AddTasks - Sdelete deployed via GPO and run recursively (ASIM Version) Deploy to Azure
AddTasks - SharePointFileOperation via devices with previously unseen user agents Deploy to Azure
AddTasks - SharePointFileOperation via previously unseen IPs Deploy to Azure
AddTasks - Sign-ins from IPs that attempt sign-ins to disabled accounts (Uses Authentication Normalization) Deploy to Azure
AddTasks - Sign-ins from IPs that attempt sign-ins to disabled accounts Deploy to Azure
AddTasks - Successful logon from IP and failure from a different IP Deploy to Azure
AddTasks - Suspicious application consent for offline access Deploy to Azure
AddTasks - Suspicious application consent similar to O365 Attack Toolkit Deploy to Azure
AddTasks - Suspicious application consent similar to PwnAuth Deploy to Azure
AddTasks - Suspicious number of resource creation or deployment activities Deploy to Azure
AddTasks - TEARDROP memory-only dropper Deploy to Azure
AddTasks - Threat Essentials - Mail redirect via ExO transport rule Deploy to Azure
AddTasks - Threat Essentials - User Assigned Privileged Role Deploy to Azure
AddTasks - URL Added to Application from Unknown Domain Deploy to Azure
AddTasks - User Accounts - Sign in Failure due to CA Spikes Deploy to Azure
AddTasks - User Assigned Privileged Role Deploy to Azure
AddTasks - User agent search for log4j exploitation attempt Deploy to Azure
AddTasks - User login from different countries within 3 hours (Uses Authentication Normalization) Deploy to Azure