Files
blue-team-tools/rules/cloud
Mark Morowczynski efe2c9bbcb Merge PR #4423 from @MarkMorow - Add Azure AD Identity Protection Rules
new: Anomalous User Activity
new: Activity From Anonymous IP Address
new: Atypical Travel
new: Impossible Travel
new: Suspicious Inbox Forwarding Identity Protection
new: Suspicious Inbox Manipulation Rules
new: Azure AD Account Credential Leaked
new: Sign-In From Malware Infected IP
new: New Country
new: Password Spray Activity
new: Suspicious Browser Activity
new: SAML Token Issuer Anomaly
new: Unfamiliar Sign-In Properties

---------

Co-authored-by: gleeiamglo <142270304+gleeiamglo@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-06 10:56:13 +02:00
..
2022-12-27 12:29:10 +01:00
2022-12-27 12:29:10 +01:00
2023-01-27 06:48:34 +01:00
2022-12-27 12:29:10 +01:00