Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Stale last password change

Back
Id645A8724-5C7E-4A1F-81CB-C33AFF1439EB
RulenameStale last password change
DescriptionThis query searches for stale last password change
SeverityLow
TacticsInitialAccess
TechniquesT1566
Required data connectorsSenservaPro
KindScheduled
Query frequency6h
Query period6h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SenservaPro/Analytic Rules/SearchStaleLastPasswordChange.yaml
Version1.0.0
Arm template645A8724-5C7E-4A1F-81CB-C33AFF1439EB.json
Deploy To Azure
SenservaPro_CL
| where ControlName_s == 'UserStaleLastPasswordChange'
name: Stale last password change
query: |
  SenservaPro_CL
  | where ControlName_s == 'UserStaleLastPasswordChange'  
queryFrequency: 6h
triggerOperator: gt
requiredDataConnectors:
- dataTypes:
  - SenservaPro_CL
  connectorId: SenservaPro
status: Available
entityMappings:
- entityType: Account
  fieldMappings:
  - identifier: Name
    columnName: ControlName_s
  - identifier: AadTenantId
    columnName: TenantId
  - identifier: DisplayName
    columnName: TenantDisplayName_s
- entityType: SecurityGroup
  fieldMappings:
  - identifier: DistinguishedName
    columnName: Group_s
- entityType: AzureResource
  fieldMappings:
  - identifier: ResourceId
    columnName: SourceSystem
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SenservaPro/Analytic Rules/SearchStaleLastPasswordChange.yaml
description: |
    'This query searches for stale last password change'
version: 1.0.0
id: 645A8724-5C7E-4A1F-81CB-C33AFF1439EB
kind: Scheduled
relevantTechniques:
- T1566
severity: Low
tactics:
- InitialAccess
queryPeriod: 6h