95793d73bd
chore: update workflows and add quality of life updates and automation to the repository --------- Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
28 lines
1.0 KiB
YAML
28 lines
1.0 KiB
YAML
title: Privilege Role Sign-In Outside Of Normal Hours
|
|
id: e927a2f5-e7af-424f-ace7-70ebb49e8976
|
|
status: test
|
|
description: Detects account sign ins outside of normal hours or uncommon locations. Administrator accounts should be investigated
|
|
references:
|
|
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts#things-to-monitor
|
|
author: Mark Morowczynski '@markmorow', Yochana Henderson, '@Yochana-H'
|
|
date: 2022/08/11
|
|
tags:
|
|
- attack.persistence
|
|
- attack.t1078
|
|
logsource:
|
|
product: azure
|
|
service: signinlogs
|
|
detection:
|
|
# You need to tune the rule for your enrivonnement before use
|
|
selection:
|
|
Status: Sucess
|
|
# Countries you DO operate out of e,g GB, use list for mulitple
|
|
Location: '%LegitCountries%'
|
|
# outside normal working hours
|
|
Date: '%ClosingTime%'
|
|
Initiatied.By: '%ApprovedUserUpn%'
|
|
condition: selection
|
|
falsepositives:
|
|
- An admin doing actual work outside of normal business hours
|
|
level: high
|