[Rule Tuning] Possible Consent Grant Attack via Azure-Registered Application (#575)
* Update initial_access_consent_grant_attack_via_azure_registered_application.toml * bump updated_date Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com> Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>
This commit is contained in:
+5
-4
@@ -1,12 +1,12 @@
|
||||
[metadata]
|
||||
creation_date = "2020/09/01"
|
||||
maturity = "production"
|
||||
updated_date = "2020/10/26"
|
||||
updated_date = "2020/12/08"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies when a user grants permissions to an Azure-registered application or when an administrator grants tenant-wide
|
||||
Detects when a user grants permissions to an Azure-registered application or when an administrator grants tenant-wide
|
||||
permissions to an application. An adversary may create an Azure-registered application that requests access to data such
|
||||
as contact information, email, or documents.
|
||||
"""
|
||||
@@ -30,10 +30,11 @@ tags = ["Elastic", "Cloud", "Azure", "Continuous Monitoring", "SecOps", "Identit
|
||||
type = "query"
|
||||
|
||||
query = '''
|
||||
event.dataset:(azure.activitylogs or azure.auditlogs) and
|
||||
event.dataset:(azure.activitylogs or azure.auditlogs or o365.audit) and
|
||||
(
|
||||
azure.activitylogs.operation_name:"Consent to application" or
|
||||
azure.auditlogs.operation_name:"Consent to application"
|
||||
azure.auditlogs.operation_name:"Consent to application" or
|
||||
o365.audit.Operation:"Consent to application."
|
||||
) and
|
||||
event.outcome:success
|
||||
'''
|
||||
|
||||
Reference in New Issue
Block a user