29ca26b32c
Updating MITRE Tactics & Techniques to align with existing classifications
27 lines
946 B
YAML
27 lines
946 B
YAML
title: Application AppID Uri Configuration Changes
|
|
id: 1b45b0d1-773f-4f23-aedc-814b759563b1
|
|
status: experimental
|
|
description: Detects when a configuration change is made to an applications AppID URI.
|
|
references:
|
|
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-applications#appid-uri-added-modified-or-removed
|
|
author: Mark Morowczynski '@markmorow', Bailey Bercik '@baileybercik'
|
|
date: 2022/06/02
|
|
tags:
|
|
- attack.persistence
|
|
- attack.credential_access
|
|
- attack.privilege_escalation
|
|
- attack.t1552
|
|
- attack.t1078.004
|
|
logsource:
|
|
product: azure
|
|
service: auditlogs
|
|
detection:
|
|
selection:
|
|
properties.message:
|
|
- Update Application
|
|
- Update Service principal
|
|
condition: selection
|
|
falsepositives:
|
|
- When and administrator is making legitimate AppID URI configuration changes to an application. This should be a planned event.
|
|
level: high
|