refactor: first bigger log source refactoring
see discussion here: https://github.com/SigmaHQ/sigma/discussions/2835
This commit is contained in:
@@ -1,7 +1,7 @@
|
|||||||
title: Azure Active Directory Hybrid Health AD FS New Server
|
title: Azure Active Directory Hybrid Health AD FS New Server
|
||||||
id: 288a39fc-4914-4831-9ada-270e9dc12cb4
|
id: 288a39fc-4914-4831-9ada-270e9dc12cb4
|
||||||
description: |
|
description: |
|
||||||
This detection uses AzureActivity logs (Administrative category) to identify the creation or update of a server instance in an Azure AD Hybrid health AD FS service.
|
This detection uses azureactivity logs (Administrative category) to identify the creation or update of a server instance in an Azure AD Hybrid health AD FS service.
|
||||||
A threat actor can create a new AD Health ADFS service and create a fake server instance to spoof AD FS signing logs. There is no need to compromise an on-prem AD FS server.
|
A threat actor can create a new AD Health ADFS service and create a fake server instance to spoof AD FS signing logs. There is no need to compromise an on-prem AD FS server.
|
||||||
This can be done programmatically via HTTP requests to Azure.
|
This can be done programmatically via HTTP requests to Azure.
|
||||||
status: experimental
|
status: experimental
|
||||||
@@ -14,7 +14,7 @@ references:
|
|||||||
- https://o365blog.com/post/hybridhealthagent/
|
- https://o365blog.com/post/hybridhealthagent/
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: AzureActivity
|
service: azureactivity
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
CategoryValue: 'Administrative'
|
CategoryValue: 'Administrative'
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
title: Azure Active Directory Hybrid Health AD FS Service Delete
|
title: Azure Active Directory Hybrid Health AD FS Service Delete
|
||||||
id: 48739819-8230-4ee3-a8ea-e0289d1fb0ff
|
id: 48739819-8230-4ee3-a8ea-e0289d1fb0ff
|
||||||
description: |
|
description: |
|
||||||
This detection uses AzureActivity logs (Administrative category) to identify the deletion of an Azure AD Hybrid health AD FS service instance in a tenant.
|
This detection uses azureactivity logs (Administrative category) to identify the deletion of an Azure AD Hybrid health AD FS service instance in a tenant.
|
||||||
A threat actor can create a new AD Health ADFS service and create a fake server to spoof AD FS signing logs.
|
A threat actor can create a new AD Health ADFS service and create a fake server to spoof AD FS signing logs.
|
||||||
The health AD FS service can then be deleted after it is not longer needed via HTTP requests to Azure.
|
The health AD FS service can then be deleted after it is not longer needed via HTTP requests to Azure.
|
||||||
status: experimental
|
status: experimental
|
||||||
@@ -14,7 +14,7 @@ references:
|
|||||||
- https://o365blog.com/post/hybridhealthagent/
|
- https://o365blog.com/post/hybridhealthagent/
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: AzureActivity
|
service: azureactivity
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
CategoryValue: 'Administrative'
|
CategoryValue: 'Administrative'
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
|
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.signinlogs
|
service: signinlogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
ResultType: 50053
|
ResultType: 50053
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://www.cloud-architekt.net/auditing-of-msi-and-service-principals/
|
- https://www.cloud-architekt.net/auditing-of-msi-and-service-principals/
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message: 'Update application - Certificates and secrets management'
|
properties.message: 'Update application - Certificates and secrets management'
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
|
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
|
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.auditlogs
|
service: auditlogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
LoggedByService: 'Authentication Methods'
|
LoggedByService: 'Authentication Methods'
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ references:
|
|||||||
- https://attack.mitre.org/matrices/enterprise/cloud/
|
- https://attack.mitre.org/matrices/enterprise/cloud/
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -1,15 +1,15 @@
|
|||||||
title: Number Of Resource Creation Or Deployment Activities
|
title: Number Of Resource Creation Or Deployment Activities
|
||||||
id: d2d901db-7a75-45a1-bc39-0cbf00812192
|
id: d2d901db-7a75-45a1-bc39-0cbf00812192
|
||||||
status: test
|
status: test
|
||||||
description: Number of VM creations or deployment activities occur in Azure via the AzureActivity log.
|
description: Number of VM creations or deployment activities occur in Azure via the azureactivity log.
|
||||||
author: sawwinnnaung
|
author: sawwinnnaung
|
||||||
references:
|
references:
|
||||||
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AzureActivity/Creating_Anomalous_Number_Of_Resources_detection.yaml
|
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/azureactivity/Creating_Anomalous_Number_Of_Resources_detection.yaml
|
||||||
date: 2020/05/07
|
date: 2020/05/07
|
||||||
modified: 2021/11/27
|
modified: 2021/11/27
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: AzureActivity
|
service: azureactivity
|
||||||
detection:
|
detection:
|
||||||
keywords:
|
keywords:
|
||||||
- Microsoft.Compute/virtualMachines/write
|
- Microsoft.Compute/virtualMachines/write
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#core-directory
|
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#core-directory
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#core-directory
|
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#core-directory
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message|startswith: MICROSOFT.NETWORK/DNSZONES
|
properties.message|startswith: MICROSOFT.NETWORK/DNSZONES
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://attack.mitre.org/techniques/T1078
|
- https://attack.mitre.org/techniques/T1078
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.signinlogs
|
service: signinlogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message: Set federation settings on domain
|
properties.message: Set federation settings on domain
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -4,12 +4,12 @@ status: test
|
|||||||
description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.
|
description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.
|
||||||
author: sawwinnnaung
|
author: sawwinnnaung
|
||||||
references:
|
references:
|
||||||
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AzureActivity/Granting_Permissions_To_Account_detection.yaml
|
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/azureactivity/Granting_Permissions_To_Account_detection.yaml
|
||||||
date: 2020/05/07
|
date: 2020/05/07
|
||||||
modified: 2021/11/27
|
modified: 2021/11/27
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: AzureActivity
|
service: azureactivity
|
||||||
detection:
|
detection:
|
||||||
keywords:
|
keywords:
|
||||||
- Microsoft.Authorization/roleAssignments/write
|
- Microsoft.Authorization/roleAssignments/write
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection1:
|
selection1:
|
||||||
properties.message|startswith:
|
properties.message|startswith:
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ references:
|
|||||||
- https://attack.mitre.org/matrices/enterprise/cloud/
|
- https://attack.mitre.org/matrices/enterprise/cloud/
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ references:
|
|||||||
- https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
|
- https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection1:
|
selection1:
|
||||||
properties.message|startswith:
|
properties.message|startswith:
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ references:
|
|||||||
- https://github.com/elastic/detection-rules/blob/da3852b681cf1a33898b1535892eab1f3a76177a/rules/integrations/azure/defense_evasion_kubernetes_events_deleted.toml
|
- https://github.com/elastic/detection-rules/blob/da3852b681cf1a33898b1535892eab1f3a76177a/rules/integrations/azure/defense_evasion_kubernetes_events_deleted.toml
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection_operation_name:
|
selection_operation_name:
|
||||||
properties.message: MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE
|
properties.message: MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ references:
|
|||||||
- https://attack.mitre.org/matrices/enterprise/cloud/
|
- https://attack.mitre.org/matrices/enterprise/cloud/
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ references:
|
|||||||
- https://github.com/elastic/detection-rules/blob/065bf48a9987cd8bd826c098a30ce36e6868ee46/rules/integrations/azure/impact_kubernetes_pod_deleted.toml
|
- https://github.com/elastic/detection-rules/blob/065bf48a9987cd8bd826c098a30ce36e6868ee46/rules/integrations/azure/impact_kubernetes_pod_deleted.toml
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection_operation_name:
|
selection_operation_name:
|
||||||
properties.message: MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/PODS/DELETE
|
properties.message: MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/PODS/DELETE
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ references:
|
|||||||
- https://attack.mitre.org/matrices/enterprise/cloud/
|
- https://attack.mitre.org/matrices/enterprise/cloud/
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ references:
|
|||||||
- https://attack.mitre.org/matrices/enterprise/cloud/
|
- https://attack.mitre.org/matrices/enterprise/cloud/
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ references:
|
|||||||
- https://attack.mitre.org/matrices/enterprise/cloud/
|
- https://attack.mitre.org/matrices/enterprise/cloud/
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ references:
|
|||||||
- https://attack.mitre.org/matrices/enterprise/cloud/
|
- https://attack.mitre.org/matrices/enterprise/cloud/
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
|
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.signinlogs
|
service: signinlogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
ResultType: 50057
|
ResultType: 50057
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates
|
- https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
eventSource: AzureActiveDirectory
|
eventSource: AzureActiveDirectory
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
|
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.signinlogs
|
service: signinlogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
ResultType: 50074
|
ResultType: 50074
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message: MICROSOFT.PORTAL/CONSOLES/WRITE
|
properties.message: MICROSOFT.PORTAL/CONSOLES/WRITE
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
|
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -4,12 +4,12 @@ status: test
|
|||||||
description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.
|
description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.
|
||||||
author: sawwinnnaung
|
author: sawwinnnaung
|
||||||
references:
|
references:
|
||||||
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AzureActivity/RareOperations.yaml
|
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/azureactivity/RareOperations.yaml
|
||||||
date: 2020/05/07
|
date: 2020/05/07
|
||||||
modified: 2021/11/27
|
modified: 2021/11/27
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: AzureActivity
|
service: azureactivity
|
||||||
detection:
|
detection:
|
||||||
keywords:
|
keywords:
|
||||||
- Microsoft.DocumentDB/databaseAccounts/listKeys/action
|
- Microsoft.DocumentDB/databaseAccounts/listKeys/action
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
|
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message: 'Add service principal'
|
properties.message: 'Add service principal'
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
|
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message: Remove service principal
|
properties.message: Remove service principal
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftauthorization
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftauthorization
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection1:
|
selection1:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts#assignment-and-elevation
|
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts#assignment-and-elevation
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.auditlogs
|
service: auditlogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
Category: 'Administrative'
|
Category: 'Administrative'
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
|
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.signinlogs
|
service: signinlogs
|
||||||
detection:
|
detection:
|
||||||
selection1:
|
selection1:
|
||||||
ResultType: 50097
|
ResultType: 50097
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
|
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.signinlogs
|
service: signinlogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
ResultType: 53003
|
ResultType: 53003
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message|startswith:
|
properties.message|startswith:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
|
||||||
logsource:
|
logsource:
|
||||||
product: azure
|
product: azure
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
properties.message:
|
properties.message:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
||||||
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
||||||
logsource:
|
logsource:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
||||||
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
||||||
logsource:
|
logsource:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
||||||
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
||||||
logsource:
|
logsource:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
||||||
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
||||||
logsource:
|
logsource:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
||||||
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
||||||
logsource:
|
logsource:
|
||||||
category: ThreatDetection
|
service: threat_detection
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ references:
|
|||||||
date: 2020/07/06
|
date: 2020/07/06
|
||||||
modified: 2021/11/27
|
modified: 2021/11/27
|
||||||
logsource:
|
logsource:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
||||||
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
||||||
logsource:
|
logsource:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ references:
|
|||||||
- https://www.sygnia.co/golden-saml-advisory
|
- https://www.sygnia.co/golden-saml-advisory
|
||||||
- https://o365blog.com/post/aadbackdoor/
|
- https://o365blog.com/post/aadbackdoor/
|
||||||
logsource:
|
logsource:
|
||||||
category: Exchange
|
service: exchange
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
||||||
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
||||||
logsource:
|
logsource:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
||||||
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
||||||
logsource:
|
logsource:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
||||||
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
||||||
logsource:
|
logsource:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
||||||
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
||||||
logsource:
|
logsource:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
|
||||||
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
|
||||||
logsource:
|
logsource:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
product: m365
|
product: m365
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
|
|||||||
@@ -53,7 +53,7 @@ references:
|
|||||||
# - PCI DSS 3.2 7.2
|
# - PCI DSS 3.2 7.2
|
||||||
# - PCI DSS 3.2 7.3
|
# - PCI DSS 3.2 7.3
|
||||||
logsource:
|
logsource:
|
||||||
product: netflow
|
service: netflow
|
||||||
detection:
|
detection:
|
||||||
selection:
|
selection:
|
||||||
destination.port:
|
destination.port:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
date: 2017/02/28
|
date: 2017/02/28
|
||||||
modified: 2021/11/27
|
modified: 2021/11/27
|
||||||
logsource:
|
logsource:
|
||||||
product: apache
|
service: apache
|
||||||
detection:
|
detection:
|
||||||
keywords:
|
keywords:
|
||||||
- 'exit signal Segmentation Fault'
|
- 'exit signal Segmentation Fault'
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
date: 2019/01/22
|
date: 2019/01/22
|
||||||
modified: 2021/11/27
|
modified: 2021/11/27
|
||||||
logsource:
|
logsource:
|
||||||
product: apache
|
service: apache
|
||||||
detection:
|
detection:
|
||||||
keywords:
|
keywords:
|
||||||
- '__pthread_tpp_change_priority: Assertion `new_prio == -1 || (new_prio >= fifo_min_prio && new_prio <= fifo_max_prio)'
|
- '__pthread_tpp_change_priority: Assertion `new_prio == -1 || (new_prio >= fifo_min_prio && new_prio <= fifo_max_prio)'
|
||||||
|
|||||||
@@ -15,7 +15,6 @@ tags:
|
|||||||
- attack.persistence
|
- attack.persistence
|
||||||
- attack.t1505.003
|
- attack.t1505.003
|
||||||
logsource:
|
logsource:
|
||||||
product: zoho_manageengine
|
|
||||||
category: webserver
|
category: webserver
|
||||||
definition: 'Must be collect log from \ManageEngine\ADSelfService Plus\logs'
|
definition: 'Must be collect log from \ManageEngine\ADSelfService Plus\logs'
|
||||||
detection:
|
detection:
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ references:
|
|||||||
- https://docs.nginx.com/nginx/admin-guide/monitoring/debugging/#enabling-core-dumps
|
- https://docs.nginx.com/nginx/admin-guide/monitoring/debugging/#enabling-core-dumps
|
||||||
- https://www.x41-dsec.de/lab/advisories/x41-2021-002-nginx-resolver-copy/
|
- https://www.x41-dsec.de/lab/advisories/x41-2021-002-nginx-resolver-copy/
|
||||||
logsource:
|
logsource:
|
||||||
product: apache
|
service: apache
|
||||||
detection:
|
detection:
|
||||||
keywords:
|
keywords:
|
||||||
- 'exited on signal 6 (core dumped)'
|
- 'exited on signal 6 (core dumped)'
|
||||||
|
|||||||
@@ -125,9 +125,9 @@ logsources:
|
|||||||
deviceProduct: Spring
|
deviceProduct: Spring
|
||||||
categoryDeviceGroup: /Application
|
categoryDeviceGroup: /Application
|
||||||
apache:
|
apache:
|
||||||
product: apache
|
service: apache
|
||||||
conditions:
|
conditions:
|
||||||
deviceProduct: Apache
|
deviceservice: apache
|
||||||
categoryDeviceGroup: /Application
|
categoryDeviceGroup: /Application
|
||||||
firewall:
|
firewall:
|
||||||
product: firewall
|
product: firewall
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ logsources:
|
|||||||
category: proxy
|
category: proxy
|
||||||
index: proxy.all.access
|
index: proxy.all.access
|
||||||
apache:
|
apache:
|
||||||
product: apache
|
service: apache
|
||||||
index: web.all.access
|
index: web.all.access
|
||||||
fieldmappings:
|
fieldmappings:
|
||||||
c-uri: url
|
c-uri: url
|
||||||
|
|||||||
@@ -6,6 +6,6 @@ backends:
|
|||||||
fieldmappings:
|
fieldmappings:
|
||||||
category: azure.auditlogs.properties.category
|
category: azure.auditlogs.properties.category
|
||||||
activityDisplayName: event.action
|
activityDisplayName: event.action
|
||||||
loggedByService: azure.auditlogs.properties.logged_by_service
|
loggedByservice: auditlogs.properties.logged_by_service
|
||||||
result: event.outcome
|
result: event.outcome
|
||||||
initiatedBy.user.userPrincipalName: azure.auditlogs.properties.initiated_by.user.userPrincipalName
|
initiatedBy.user.userPrincipalName: azure.auditlogs.properties.initiated_by.user.userPrincipalName
|
||||||
|
|||||||
@@ -116,7 +116,7 @@ logsources:
|
|||||||
category: firewall
|
category: firewall
|
||||||
index: firewall
|
index: firewall
|
||||||
connection:
|
connection:
|
||||||
category: netflow
|
service: netflow
|
||||||
index: connection
|
index: connection
|
||||||
proxy:
|
proxy:
|
||||||
category: proxy
|
category: proxy
|
||||||
|
|||||||
@@ -1,33 +1,33 @@
|
|||||||
title: Microsoft 365 Rules
|
title: Microsoft 365 Rules
|
||||||
order: 10
|
order: 10
|
||||||
logsources:
|
logsources:
|
||||||
ThreatManagement:
|
threat_management:
|
||||||
product: m365
|
product: m365
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
conditions:
|
conditions:
|
||||||
eventSource: SecurityComplianceCenter
|
eventSource: SecurityComplianceCenter
|
||||||
AccessGovernance:
|
access_governance:
|
||||||
product: m365
|
product: m365
|
||||||
category: AccessGovernance
|
service: access_governance
|
||||||
conditions:
|
conditions:
|
||||||
eventSource: SecurityComplianceCenter
|
eventSource: SecurityComplianceCenter
|
||||||
CloudDiscovery:
|
cloud_discovery:
|
||||||
product: m365
|
product: m365
|
||||||
category: CloudDiscovery
|
service: cloud_discovery
|
||||||
conditions:
|
conditions:
|
||||||
eventSource: SecurityComplianceCenter
|
eventSource: SecurityComplianceCenter
|
||||||
DataLossPrevention:
|
data_loss_prevention:
|
||||||
product: m365
|
product: m365
|
||||||
category: DataLossPrevention
|
service: data_loss_prevention
|
||||||
conditions:
|
conditions:
|
||||||
eventSource: SecurityComplianceCenter
|
eventSource: SecurityComplianceCenter
|
||||||
ThreatDetection:
|
threat_detection:
|
||||||
product: m365
|
product: m365
|
||||||
category: ThreatDetection
|
service: threat_detection
|
||||||
conditions:
|
conditions:
|
||||||
eventSource: SecurityComplianceCenter
|
eventSource: SecurityComplianceCenter
|
||||||
SharingControl:
|
sharing_control:
|
||||||
product: m365
|
product: m365
|
||||||
category: SharingControl
|
service: sharing_control
|
||||||
conditions:
|
conditions:
|
||||||
eventSource: SecurityComplianceCenter
|
eventSource: SecurityComplianceCenter
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ logsources:
|
|||||||
conditions:
|
conditions:
|
||||||
vendor_type: 'Antivirus'
|
vendor_type: 'Antivirus'
|
||||||
apache:
|
apache:
|
||||||
product: apache
|
service: apache
|
||||||
conditions:
|
conditions:
|
||||||
product_name:
|
product_name:
|
||||||
- 'apache*'
|
- 'apache*'
|
||||||
@@ -41,13 +41,13 @@ logsources:
|
|||||||
vendor_name: "Microsoft"
|
vendor_name: "Microsoft"
|
||||||
product_name: "Onelogin"
|
product_name: "Onelogin"
|
||||||
microsoft365:
|
microsoft365:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
service: Microsoft365
|
service: Microsoft365
|
||||||
conditions:
|
conditions:
|
||||||
vendor_name: "Microsoft"
|
vendor_name: "Microsoft"
|
||||||
product_name: "365"
|
product_name: "365"
|
||||||
m365:
|
m365:
|
||||||
category: ThreatManagement
|
service: threat_management
|
||||||
service: m365
|
service: m365
|
||||||
conditions:
|
conditions:
|
||||||
vendor_name: "Microsoft"
|
vendor_name: "Microsoft"
|
||||||
@@ -218,22 +218,22 @@ logsources:
|
|||||||
conditions:
|
conditions:
|
||||||
vendor_name: "Zeek IDS"
|
vendor_name: "Zeek IDS"
|
||||||
azure-signin:
|
azure-signin:
|
||||||
service: azure.signinlogs
|
service: signinlogs
|
||||||
conditions:
|
conditions:
|
||||||
vendor_name: "Microsoft"
|
vendor_name: "Microsoft"
|
||||||
product_name: "Azure"
|
product_name: "Azure"
|
||||||
azure-auditlogs:
|
azure-auditlogs:
|
||||||
service: azure.auditlogs
|
service: auditlogs
|
||||||
conditions:
|
conditions:
|
||||||
vendor_name: "Microsoft"
|
vendor_name: "Microsoft"
|
||||||
product_name: "Azure"
|
product_name: "Azure"
|
||||||
azure-activitylogs:
|
azure-activitylogs:
|
||||||
service: azure.activitylogs
|
service: activitylogs
|
||||||
conditions:
|
conditions:
|
||||||
vendor_name: "Microsoft"
|
vendor_name: "Microsoft"
|
||||||
product_name: "Azure"
|
product_name: "Azure"
|
||||||
azure-activity:
|
azure-activity:
|
||||||
service: AzureActivity
|
service: azureactivity
|
||||||
conditions:
|
conditions:
|
||||||
vendor_name: "Microsoft"
|
vendor_name: "Microsoft"
|
||||||
product_name: "Azure"
|
product_name: "Azure"
|
||||||
@@ -382,7 +382,7 @@ logsources:
|
|||||||
qflow:
|
qflow:
|
||||||
product: qflow
|
product: qflow
|
||||||
netflow:
|
netflow:
|
||||||
product: netflow
|
service: netflow
|
||||||
ipfix:
|
ipfix:
|
||||||
product: ipfix
|
product: ipfix
|
||||||
flow:
|
flow:
|
||||||
|
|||||||
@@ -8,4 +8,4 @@ logsources:
|
|||||||
linux:
|
linux:
|
||||||
product: linux
|
product: linux
|
||||||
netflow:
|
netflow:
|
||||||
product: netflow
|
service: netflow
|
||||||
@@ -4,7 +4,7 @@ backends:
|
|||||||
order: 20
|
order: 20
|
||||||
logsources:
|
logsources:
|
||||||
apache:
|
apache:
|
||||||
product: apache
|
service: apache
|
||||||
index: apache
|
index: apache
|
||||||
conditions:
|
conditions:
|
||||||
LOGSOURCETYPENAME(devicetype): '*apache*'
|
LOGSOURCETYPENAME(devicetype): '*apache*'
|
||||||
@@ -17,7 +17,7 @@ logsources:
|
|||||||
product: qflow
|
product: qflow
|
||||||
index: flows
|
index: flows
|
||||||
netflow:
|
netflow:
|
||||||
product: netflow
|
service: netflow
|
||||||
index: flows
|
index: flows
|
||||||
ipfix:
|
ipfix:
|
||||||
product: ipfix
|
product: ipfix
|
||||||
|
|||||||
@@ -64,11 +64,10 @@ logsources:
|
|||||||
product: gsuite
|
product: gsuite
|
||||||
index: gsuite
|
index: gsuite
|
||||||
apache:
|
apache:
|
||||||
product: apache
|
|
||||||
service: apache
|
service: apache
|
||||||
index: Apache
|
index: Apache
|
||||||
apache2:
|
apache2:
|
||||||
product: apache
|
service: apache
|
||||||
index: Apache
|
index: Apache
|
||||||
nginx:
|
nginx:
|
||||||
product: nginx
|
product: nginx
|
||||||
|
|||||||
@@ -107,11 +107,10 @@ logsources:
|
|||||||
conditions:
|
conditions:
|
||||||
EventChannel: 'Microsoft-Windows-Bits-Client/Operational'
|
EventChannel: 'Microsoft-Windows-Bits-Client/Operational'
|
||||||
apache:
|
apache:
|
||||||
product: apache
|
|
||||||
service: apache
|
service: apache
|
||||||
index: WEBSERVER
|
index: WEBSERVER
|
||||||
apache2:
|
apache2:
|
||||||
product: apache
|
service: apache
|
||||||
index: WEBSERVER
|
index: WEBSERVER
|
||||||
webserver:
|
webserver:
|
||||||
category: webserver
|
category: webserver
|
||||||
|
|||||||
Reference in New Issue
Block a user