refactor: first bigger log source refactoring

see discussion here: https://github.com/SigmaHQ/sigma/discussions/2835
This commit is contained in:
Florian Roth
2022-03-22 17:58:29 +01:00
parent a5281c0eaf
commit e91fc4486e
78 changed files with 103 additions and 106 deletions
@@ -1,7 +1,7 @@
title: Azure Active Directory Hybrid Health AD FS New Server title: Azure Active Directory Hybrid Health AD FS New Server
id: 288a39fc-4914-4831-9ada-270e9dc12cb4 id: 288a39fc-4914-4831-9ada-270e9dc12cb4
description: | description: |
This detection uses AzureActivity logs (Administrative category) to identify the creation or update of a server instance in an Azure AD Hybrid health AD FS service. This detection uses azureactivity logs (Administrative category) to identify the creation or update of a server instance in an Azure AD Hybrid health AD FS service.
A threat actor can create a new AD Health ADFS service and create a fake server instance to spoof AD FS signing logs. There is no need to compromise an on-prem AD FS server. A threat actor can create a new AD Health ADFS service and create a fake server instance to spoof AD FS signing logs. There is no need to compromise an on-prem AD FS server.
This can be done programmatically via HTTP requests to Azure. This can be done programmatically via HTTP requests to Azure.
status: experimental status: experimental
@@ -14,7 +14,7 @@ references:
- https://o365blog.com/post/hybridhealthagent/ - https://o365blog.com/post/hybridhealthagent/
logsource: logsource:
product: azure product: azure
service: AzureActivity service: azureactivity
detection: detection:
selection: selection:
CategoryValue: 'Administrative' CategoryValue: 'Administrative'
@@ -1,7 +1,7 @@
title: Azure Active Directory Hybrid Health AD FS Service Delete title: Azure Active Directory Hybrid Health AD FS Service Delete
id: 48739819-8230-4ee3-a8ea-e0289d1fb0ff id: 48739819-8230-4ee3-a8ea-e0289d1fb0ff
description: | description: |
This detection uses AzureActivity logs (Administrative category) to identify the deletion of an Azure AD Hybrid health AD FS service instance in a tenant. This detection uses azureactivity logs (Administrative category) to identify the deletion of an Azure AD Hybrid health AD FS service instance in a tenant.
A threat actor can create a new AD Health ADFS service and create a fake server to spoof AD FS signing logs. A threat actor can create a new AD Health ADFS service and create a fake server to spoof AD FS signing logs.
The health AD FS service can then be deleted after it is not longer needed via HTTP requests to Azure. The health AD FS service can then be deleted after it is not longer needed via HTTP requests to Azure.
status: experimental status: experimental
@@ -14,7 +14,7 @@ references:
- https://o365blog.com/post/hybridhealthagent/ - https://o365blog.com/post/hybridhealthagent/
logsource: logsource:
product: azure product: azure
service: AzureActivity service: azureactivity
detection: detection:
selection: selection:
CategoryValue: 'Administrative' CategoryValue: 'Administrative'
+1 -1
View File
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts - https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
logsource: logsource:
product: azure product: azure
service: azure.signinlogs service: signinlogs
detection: detection:
selection: selection:
ResultType: 50053 ResultType: 50053
@@ -8,7 +8,7 @@ references:
- https://www.cloud-architekt.net/auditing-of-msi-and-service-principals/ - https://www.cloud-architekt.net/auditing-of-msi-and-service-principals/
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: 'Update application - Certificates and secrets management' properties.message: 'Update application - Certificates and secrets management'
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy - https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts - https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
logsource: logsource:
product: azure product: azure
service: azure.auditlogs service: auditlogs
detection: detection:
selection: selection:
LoggedByService: 'Authentication Methods' LoggedByService: 'Authentication Methods'
@@ -12,7 +12,7 @@ references:
- https://attack.mitre.org/matrices/enterprise/cloud/ - https://attack.mitre.org/matrices/enterprise/cloud/
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -1,15 +1,15 @@
title: Number Of Resource Creation Or Deployment Activities title: Number Of Resource Creation Or Deployment Activities
id: d2d901db-7a75-45a1-bc39-0cbf00812192 id: d2d901db-7a75-45a1-bc39-0cbf00812192
status: test status: test
description: Number of VM creations or deployment activities occur in Azure via the AzureActivity log. description: Number of VM creations or deployment activities occur in Azure via the azureactivity log.
author: sawwinnnaung author: sawwinnnaung
references: references:
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AzureActivity/Creating_Anomalous_Number_Of_Resources_detection.yaml - https://github.com/Azure/Azure-Sentinel/blob/master/Detections/azureactivity/Creating_Anomalous_Number_Of_Resources_detection.yaml
date: 2020/05/07 date: 2020/05/07
modified: 2021/11/27 modified: 2021/11/27
logsource: logsource:
product: azure product: azure
service: AzureActivity service: azureactivity
detection: detection:
keywords: keywords:
- Microsoft.Compute/virtualMachines/write - Microsoft.Compute/virtualMachines/write
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#core-directory - https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#core-directory
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#core-directory - https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#core-directory
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message|startswith: MICROSOFT.NETWORK/DNSZONES properties.message|startswith: MICROSOFT.NETWORK/DNSZONES
@@ -8,7 +8,7 @@ references:
- https://attack.mitre.org/techniques/T1078 - https://attack.mitre.org/techniques/T1078
logsource: logsource:
product: azure product: azure
service: azure.signinlogs service: signinlogs
detection: detection:
selection: selection:
properties.message: Set federation settings on domain properties.message: Set federation settings on domain
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -4,12 +4,12 @@ status: test
description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used. description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.
author: sawwinnnaung author: sawwinnnaung
references: references:
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AzureActivity/Granting_Permissions_To_Account_detection.yaml - https://github.com/Azure/Azure-Sentinel/blob/master/Detections/azureactivity/Granting_Permissions_To_Account_detection.yaml
date: 2020/05/07 date: 2020/05/07
modified: 2021/11/27 modified: 2021/11/27
logsource: logsource:
product: azure product: azure
service: AzureActivity service: azureactivity
detection: detection:
keywords: keywords:
- Microsoft.Authorization/roleAssignments/write - Microsoft.Authorization/roleAssignments/write
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -9,7 +9,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection1: selection1:
properties.message|startswith: properties.message|startswith:
@@ -12,7 +12,7 @@ references:
- https://attack.mitre.org/matrices/enterprise/cloud/ - https://attack.mitre.org/matrices/enterprise/cloud/
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -11,7 +11,7 @@ references:
- https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/ - https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection1: selection1:
properties.message|startswith: properties.message|startswith:
@@ -9,7 +9,7 @@ references:
- https://github.com/elastic/detection-rules/blob/da3852b681cf1a33898b1535892eab1f3a76177a/rules/integrations/azure/defense_evasion_kubernetes_events_deleted.toml - https://github.com/elastic/detection-rules/blob/da3852b681cf1a33898b1535892eab1f3a76177a/rules/integrations/azure/defense_evasion_kubernetes_events_deleted.toml
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection_operation_name: selection_operation_name:
properties.message: MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE properties.message: MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE
@@ -12,7 +12,7 @@ references:
- https://attack.mitre.org/matrices/enterprise/cloud/ - https://attack.mitre.org/matrices/enterprise/cloud/
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -9,7 +9,7 @@ references:
- https://github.com/elastic/detection-rules/blob/065bf48a9987cd8bd826c098a30ce36e6868ee46/rules/integrations/azure/impact_kubernetes_pod_deleted.toml - https://github.com/elastic/detection-rules/blob/065bf48a9987cd8bd826c098a30ce36e6868ee46/rules/integrations/azure/impact_kubernetes_pod_deleted.toml
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection_operation_name: selection_operation_name:
properties.message: MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/PODS/DELETE properties.message: MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/PODS/DELETE
@@ -12,7 +12,7 @@ references:
- https://attack.mitre.org/matrices/enterprise/cloud/ - https://attack.mitre.org/matrices/enterprise/cloud/
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -12,7 +12,7 @@ references:
- https://attack.mitre.org/matrices/enterprise/cloud/ - https://attack.mitre.org/matrices/enterprise/cloud/
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -12,7 +12,7 @@ references:
- https://attack.mitre.org/matrices/enterprise/cloud/ - https://attack.mitre.org/matrices/enterprise/cloud/
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -12,7 +12,7 @@ references:
- https://attack.mitre.org/matrices/enterprise/cloud/ - https://attack.mitre.org/matrices/enterprise/cloud/
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts - https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
logsource: logsource:
product: azure product: azure
service: azure.signinlogs service: signinlogs
detection: detection:
selection: selection:
ResultType: 50057 ResultType: 50057
+1 -1
View File
@@ -9,7 +9,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates - https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
eventSource: AzureActiveDirectory eventSource: AzureActiveDirectory
+1 -1
View File
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts - https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
logsource: logsource:
product: azure product: azure
service: azure.signinlogs service: signinlogs
detection: detection:
selection: selection:
ResultType: 50074 ResultType: 50074
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: MICROSOFT.PORTAL/CONSOLES/WRITE properties.message: MICROSOFT.PORTAL/CONSOLES/WRITE
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy - https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
+2 -2
View File
@@ -4,12 +4,12 @@ status: test
description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used. description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.
author: sawwinnnaung author: sawwinnnaung
references: references:
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AzureActivity/RareOperations.yaml - https://github.com/Azure/Azure-Sentinel/blob/master/Detections/azureactivity/RareOperations.yaml
date: 2020/05/07 date: 2020/05/07
modified: 2021/11/27 modified: 2021/11/27
logsource: logsource:
product: azure product: azure
service: AzureActivity service: azureactivity
detection: detection:
keywords: keywords:
- Microsoft.DocumentDB/databaseAccounts/listKeys/action - Microsoft.DocumentDB/databaseAccounts/listKeys/action
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy - https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: 'Add service principal' properties.message: 'Add service principal'
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy - https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: Remove service principal properties.message: Remove service principal
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftauthorization - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftauthorization
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection1: selection1:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts#assignment-and-elevation - https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts#assignment-and-elevation
logsource: logsource:
product: azure product: azure
service: azure.auditlogs service: auditlogs
detection: detection:
selection: selection:
Category: 'Administrative' Category: 'Administrative'
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts - https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
logsource: logsource:
product: azure product: azure
service: azure.signinlogs service: signinlogs
detection: detection:
selection1: selection1:
ResultType: 50097 ResultType: 50097
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts - https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
logsource: logsource:
product: azure product: azure
service: azure.signinlogs service: signinlogs
detection: detection:
selection: selection:
ResultType: 53003 ResultType: 53003
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message|startswith: properties.message|startswith:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource: logsource:
product: azure product: azure
service: azure.activitylogs service: activitylogs
detection: detection:
selection: selection:
properties.message: properties.message:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy - https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference - https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource: logsource:
category: ThreatManagement service: threat_management
product: m365 product: m365
detection: detection:
selection: selection:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy - https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference - https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource: logsource:
category: ThreatManagement service: threat_management
product: m365 product: m365
detection: detection:
selection: selection:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy - https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference - https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource: logsource:
category: ThreatManagement service: threat_management
product: m365 product: m365
detection: detection:
selection: selection:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy - https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference - https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource: logsource:
category: ThreatManagement service: threat_management
product: m365 product: m365
detection: detection:
selection: selection:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy - https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference - https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource: logsource:
category: ThreatDetection service: threat_detection
product: m365 product: m365
detection: detection:
selection: selection:
@@ -9,7 +9,7 @@ references:
date: 2020/07/06 date: 2020/07/06
modified: 2021/11/27 modified: 2021/11/27
logsource: logsource:
category: ThreatManagement service: threat_management
product: m365 product: m365
detection: detection:
selection: selection:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy - https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference - https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource: logsource:
category: ThreatManagement service: threat_management
product: m365 product: m365
detection: detection:
selection: selection:
@@ -11,7 +11,7 @@ references:
- https://www.sygnia.co/golden-saml-advisory - https://www.sygnia.co/golden-saml-advisory
- https://o365blog.com/post/aadbackdoor/ - https://o365blog.com/post/aadbackdoor/
logsource: logsource:
category: Exchange service: exchange
product: m365 product: m365
detection: detection:
selection: selection:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy - https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference - https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource: logsource:
category: ThreatManagement service: threat_management
product: m365 product: m365
detection: detection:
selection: selection:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy - https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference - https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource: logsource:
category: ThreatManagement service: threat_management
product: m365 product: m365
detection: detection:
selection: selection:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy - https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference - https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource: logsource:
category: ThreatManagement service: threat_management
product: m365 product: m365
detection: detection:
selection: selection:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy - https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference - https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource: logsource:
category: ThreatManagement service: threat_management
product: m365 product: m365
detection: detection:
selection: selection:
@@ -8,7 +8,7 @@ references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy - https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference - https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource: logsource:
category: ThreatManagement service: threat_management
product: m365 product: m365
detection: detection:
selection: selection:
@@ -53,7 +53,7 @@ references:
# - PCI DSS 3.2 7.2 # - PCI DSS 3.2 7.2
# - PCI DSS 3.2 7.3 # - PCI DSS 3.2 7.3
logsource: logsource:
product: netflow service: netflow
detection: detection:
selection: selection:
destination.port: destination.port:
+1 -1
View File
@@ -8,7 +8,7 @@ references:
date: 2017/02/28 date: 2017/02/28
modified: 2021/11/27 modified: 2021/11/27
logsource: logsource:
product: apache service: apache
detection: detection:
keywords: keywords:
- 'exit signal Segmentation Fault' - 'exit signal Segmentation Fault'
+1 -1
View File
@@ -8,7 +8,7 @@ references:
date: 2019/01/22 date: 2019/01/22
modified: 2021/11/27 modified: 2021/11/27
logsource: logsource:
product: apache service: apache
detection: detection:
keywords: keywords:
- '__pthread_tpp_change_priority: Assertion `new_prio == -1 || (new_prio >= fifo_min_prio && new_prio <= fifo_max_prio)' - '__pthread_tpp_change_priority: Assertion `new_prio == -1 || (new_prio >= fifo_min_prio && new_prio <= fifo_max_prio)'
@@ -15,7 +15,6 @@ tags:
- attack.persistence - attack.persistence
- attack.t1505.003 - attack.t1505.003
logsource: logsource:
product: zoho_manageengine
category: webserver category: webserver
definition: 'Must be collect log from \ManageEngine\ADSelfService Plus\logs' definition: 'Must be collect log from \ManageEngine\ADSelfService Plus\logs'
detection: detection:
+1 -1
View File
@@ -8,7 +8,7 @@ references:
- https://docs.nginx.com/nginx/admin-guide/monitoring/debugging/#enabling-core-dumps - https://docs.nginx.com/nginx/admin-guide/monitoring/debugging/#enabling-core-dumps
- https://www.x41-dsec.de/lab/advisories/x41-2021-002-nginx-resolver-copy/ - https://www.x41-dsec.de/lab/advisories/x41-2021-002-nginx-resolver-copy/
logsource: logsource:
product: apache service: apache
detection: detection:
keywords: keywords:
- 'exited on signal 6 (core dumped)' - 'exited on signal 6 (core dumped)'
+2 -2
View File
@@ -125,9 +125,9 @@ logsources:
deviceProduct: Spring deviceProduct: Spring
categoryDeviceGroup: /Application categoryDeviceGroup: /Application
apache: apache:
product: apache service: apache
conditions: conditions:
deviceProduct: Apache deviceservice: apache
categoryDeviceGroup: /Application categoryDeviceGroup: /Application
firewall: firewall:
product: firewall product: firewall
+1 -1
View File
@@ -10,7 +10,7 @@ logsources:
category: proxy category: proxy
index: proxy.all.access index: proxy.all.access
apache: apache:
product: apache service: apache
index: web.all.access index: web.all.access
fieldmappings: fieldmappings:
c-uri: url c-uri: url
+1 -1
View File
@@ -6,6 +6,6 @@ backends:
fieldmappings: fieldmappings:
category: azure.auditlogs.properties.category category: azure.auditlogs.properties.category
activityDisplayName: event.action activityDisplayName: event.action
loggedByService: azure.auditlogs.properties.logged_by_service loggedByservice: auditlogs.properties.logged_by_service
result: event.outcome result: event.outcome
initiatedBy.user.userPrincipalName: azure.auditlogs.properties.initiated_by.user.userPrincipalName initiatedBy.user.userPrincipalName: azure.auditlogs.properties.initiated_by.user.userPrincipalName
+1 -1
View File
@@ -116,7 +116,7 @@ logsources:
category: firewall category: firewall
index: firewall index: firewall
connection: connection:
category: netflow service: netflow
index: connection index: connection
proxy: proxy:
category: proxy category: proxy
+12 -12
View File
@@ -1,33 +1,33 @@
title: Microsoft 365 Rules title: Microsoft 365 Rules
order: 10 order: 10
logsources: logsources:
ThreatManagement: threat_management:
product: m365 product: m365
category: ThreatManagement service: threat_management
conditions: conditions:
eventSource: SecurityComplianceCenter eventSource: SecurityComplianceCenter
AccessGovernance: access_governance:
product: m365 product: m365
category: AccessGovernance service: access_governance
conditions: conditions:
eventSource: SecurityComplianceCenter eventSource: SecurityComplianceCenter
CloudDiscovery: cloud_discovery:
product: m365 product: m365
category: CloudDiscovery service: cloud_discovery
conditions: conditions:
eventSource: SecurityComplianceCenter eventSource: SecurityComplianceCenter
DataLossPrevention: data_loss_prevention:
product: m365 product: m365
category: DataLossPrevention service: data_loss_prevention
conditions: conditions:
eventSource: SecurityComplianceCenter eventSource: SecurityComplianceCenter
ThreatDetection: threat_detection:
product: m365 product: m365
category: ThreatDetection service: threat_detection
conditions: conditions:
eventSource: SecurityComplianceCenter eventSource: SecurityComplianceCenter
SharingControl: sharing_control:
product: m365 product: m365
category: SharingControl service: sharing_control
conditions: conditions:
eventSource: SecurityComplianceCenter eventSource: SecurityComplianceCenter
+8 -8
View File
@@ -8,7 +8,7 @@ logsources:
conditions: conditions:
vendor_type: 'Antivirus' vendor_type: 'Antivirus'
apache: apache:
product: apache service: apache
conditions: conditions:
product_name: product_name:
- 'apache*' - 'apache*'
@@ -41,13 +41,13 @@ logsources:
vendor_name: "Microsoft" vendor_name: "Microsoft"
product_name: "Onelogin" product_name: "Onelogin"
microsoft365: microsoft365:
category: ThreatManagement service: threat_management
service: Microsoft365 service: Microsoft365
conditions: conditions:
vendor_name: "Microsoft" vendor_name: "Microsoft"
product_name: "365" product_name: "365"
m365: m365:
category: ThreatManagement service: threat_management
service: m365 service: m365
conditions: conditions:
vendor_name: "Microsoft" vendor_name: "Microsoft"
@@ -218,22 +218,22 @@ logsources:
conditions: conditions:
vendor_name: "Zeek IDS" vendor_name: "Zeek IDS"
azure-signin: azure-signin:
service: azure.signinlogs service: signinlogs
conditions: conditions:
vendor_name: "Microsoft" vendor_name: "Microsoft"
product_name: "Azure" product_name: "Azure"
azure-auditlogs: azure-auditlogs:
service: azure.auditlogs service: auditlogs
conditions: conditions:
vendor_name: "Microsoft" vendor_name: "Microsoft"
product_name: "Azure" product_name: "Azure"
azure-activitylogs: azure-activitylogs:
service: azure.activitylogs service: activitylogs
conditions: conditions:
vendor_name: "Microsoft" vendor_name: "Microsoft"
product_name: "Azure" product_name: "Azure"
azure-activity: azure-activity:
service: AzureActivity service: azureactivity
conditions: conditions:
vendor_name: "Microsoft" vendor_name: "Microsoft"
product_name: "Azure" product_name: "Azure"
@@ -382,7 +382,7 @@ logsources:
qflow: qflow:
product: qflow product: qflow
netflow: netflow:
product: netflow service: netflow
ipfix: ipfix:
product: ipfix product: ipfix
flow: flow:
+1 -1
View File
@@ -8,4 +8,4 @@ logsources:
linux: linux:
product: linux product: linux
netflow: netflow:
product: netflow service: netflow
+2 -2
View File
@@ -4,7 +4,7 @@ backends:
order: 20 order: 20
logsources: logsources:
apache: apache:
product: apache service: apache
index: apache index: apache
conditions: conditions:
LOGSOURCETYPENAME(devicetype): '*apache*' LOGSOURCETYPENAME(devicetype): '*apache*'
@@ -17,7 +17,7 @@ logsources:
product: qflow product: qflow
index: flows index: flows
netflow: netflow:
product: netflow service: netflow
index: flows index: flows
ipfix: ipfix:
product: ipfix product: ipfix
+1 -2
View File
@@ -64,11 +64,10 @@ logsources:
product: gsuite product: gsuite
index: gsuite index: gsuite
apache: apache:
product: apache
service: apache service: apache
index: Apache index: Apache
apache2: apache2:
product: apache service: apache
index: Apache index: Apache
nginx: nginx:
product: nginx product: nginx
+1 -2
View File
@@ -107,11 +107,10 @@ logsources:
conditions: conditions:
EventChannel: 'Microsoft-Windows-Bits-Client/Operational' EventChannel: 'Microsoft-Windows-Bits-Client/Operational'
apache: apache:
product: apache
service: apache service: apache
index: WEBSERVER index: WEBSERVER
apache2: apache2:
product: apache service: apache
index: WEBSERVER index: WEBSERVER
webserver: webserver:
category: webserver category: webserver