SenservaPro AD Applications Not Using Client Credentials
| Id | 56910d7b-aae7-452c-a3ed-89f72ef59234 |
| Rulename | SenservaPro AD Applications Not Using Client Credentials |
| Description | Searches for logs of AD Applications without Client Credentials (Key or Secret) |
| Severity | Medium |
| Tactics | Impact |
| Techniques | T1529 T1485 |
| Required data connectors | SenservaPro |
| Kind | Scheduled |
| Query frequency | 6h |
| Query period | 6h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SenservaPro/Analytic Rules/AppsNoClientCredentials.yaml |
| Version | 1.0.0 |
| Arm template | 56910d7b-aae7-452c-a3ed-89f72ef59234.json |
SenservaPro_CL
| where ControlName_s == 'ApplicationNotUsingClientCredentials'
queryPeriod: 6h
query: |
SenservaPro_CL
| where ControlName_s == 'ApplicationNotUsingClientCredentials'
name: SenservaPro AD Applications Not Using Client Credentials
entityMappings:
- fieldMappings:
- columnName: ControlName_s
identifier: Name
- columnName: TenantId
identifier: AadTenantId
- columnName: TenantDisplayName_s
identifier: DisplayName
entityType: Account
- fieldMappings:
- columnName: Group_s
identifier: DistinguishedName
entityType: SecurityGroup
- fieldMappings:
- columnName: SourceSystem
identifier: ResourceId
entityType: AzureResource
queryFrequency: 6h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SenservaPro/Analytic Rules/AppsNoClientCredentials.yaml
requiredDataConnectors:
- connectorId: SenservaPro
dataTypes:
- SenservaPro_CL
description: |
'Searches for logs of AD Applications without Client Credentials (Key or Secret)'
kind: Scheduled
version: 1.0.0
status: Available
severity: Medium
relevantTechniques:
- T1529
- T1485
triggerOperator: gt
triggerThreshold: 0
tactics:
- Impact
id: 56910d7b-aae7-452c-a3ed-89f72ef59234