SenservaPro AD Applications Not Using Client Credentials
| Id | 56910d7b-aae7-452c-a3ed-89f72ef59234 |
| Rulename | SenservaPro AD Applications Not Using Client Credentials |
| Description | Searches for logs of AD Applications without Client Credentials (Key or Secret) |
| Severity | Medium |
| Tactics | Impact |
| Techniques | T1529 T1485 |
| Required data connectors | SenservaPro |
| Kind | Scheduled |
| Query frequency | 6h |
| Query period | 6h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SenservaPro/Analytic Rules/AppsNoClientCredentials.yaml |
| Version | 1.0.0 |
| Arm template | 56910d7b-aae7-452c-a3ed-89f72ef59234.json |
SenservaPro_CL
| where ControlName_s == 'ApplicationNotUsingClientCredentials'
severity: Medium
description: |
'Searches for logs of AD Applications without Client Credentials (Key or Secret)'
status: Available
triggerOperator: gt
id: 56910d7b-aae7-452c-a3ed-89f72ef59234
entityMappings:
- entityType: Account
fieldMappings:
- columnName: ControlName_s
identifier: Name
- columnName: TenantId
identifier: AadTenantId
- columnName: TenantDisplayName_s
identifier: DisplayName
- entityType: SecurityGroup
fieldMappings:
- columnName: Group_s
identifier: DistinguishedName
- entityType: AzureResource
fieldMappings:
- columnName: SourceSystem
identifier: ResourceId
version: 1.0.0
tactics:
- Impact
query: |
SenservaPro_CL
| where ControlName_s == 'ApplicationNotUsingClientCredentials'
queryPeriod: 6h
requiredDataConnectors:
- dataTypes:
- SenservaPro_CL
connectorId: SenservaPro
triggerThreshold: 0
kind: Scheduled
name: SenservaPro AD Applications Not Using Client Credentials
relevantTechniques:
- T1529
- T1485
queryFrequency: 6h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SenservaPro/Analytic Rules/AppsNoClientCredentials.yaml