Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

BTP - Failed access attempts across multiple BAS subaccounts

Back
Id74b243a6-3046-48aa-8b03-e43b3c529cc1
RulenameBTP - Failed access attempts across multiple BAS subaccounts
DescriptionIdentifies failed Business Application Studio access attempts over a predefined number of subaccounts.
SeverityMedium
TacticsReconnaissance
Discovery
TechniquesT1595
T1526
Required data connectorsSAPBTPAuditEvents
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SAP BTP/Analytic Rules/BTP - Failed access attempts across multiple BAS subaccounts.yaml
Version3.0.5
Arm template74b243a6-3046-48aa-8b03-e43b3c529cc1.json
Deploy To Azure
let subaccount_detection_threshold = 3;
SAPBTPAuditLog_CL
| where Category == "audit.security-events" and Message has "Unauthorized access attempt"
| summarize Start=min(UpdatedOn), End=max(UpdatedOn), Tenants = make_set(Tenant, 100) by UserName
| where array_length(Tenants) > subaccount_detection_threshold
| project Start, End, UserName, Tenants, CloudApp = "SAP BTP"
| extend AccountName = split(UserName, "@")[0], UPNSuffix = split(UserName, "@")[1]
queryPeriod: 1h
id: 74b243a6-3046-48aa-8b03-e43b3c529cc1
relevantTechniques:
- T1595
- T1526
triggerOperator: gt
entityMappings:
- fieldMappings:
  - columnName: AccountName
    identifier: Name
  - columnName: UPNSuffix
    identifier: UPNSuffix
  entityType: Account
- fieldMappings:
  - columnName: CloudApp
    identifier: Name
  entityType: CloudApplication
query: |
  let subaccount_detection_threshold = 3;
  SAPBTPAuditLog_CL
  | where Category == "audit.security-events" and Message has "Unauthorized access attempt"
  | summarize Start=min(UpdatedOn), End=max(UpdatedOn), Tenants = make_set(Tenant, 100) by UserName
  | where array_length(Tenants) > subaccount_detection_threshold
  | project Start, End, UserName, Tenants, CloudApp = "SAP BTP"
  | extend AccountName = split(UserName, "@")[0], UPNSuffix = split(UserName, "@")[1]  
kind: Scheduled
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SAP BTP/Analytic Rules/BTP - Failed access attempts across multiple BAS subaccounts.yaml
queryFrequency: 1h
requiredDataConnectors:
- dataTypes:
  - SAPBTPAuditLog_CL
  connectorId: SAPBTPAuditEvents
eventGroupingSettings:
  aggregationKind: SingleAlert
name: BTP - Failed access attempts across multiple BAS subaccounts
version: 3.0.5
description: Identifies failed Business Application Studio access attempts over a predefined number of subaccounts.
alertDetailsOverride:
  alertDisplayNameFormat: BTP - Unauthorized access attempt to multiple tenants
  alertDescriptionFormat: '{{UserName}} attempted, and failed, to log into multiple Business Application Studio dev spaces. Tenants accessed: {{Tenants}}'
tactics:
- Reconnaissance
- Discovery
severity: Medium
status: Available
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2024-01-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/74b243a6-3046-48aa-8b03-e43b3c529cc1')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/74b243a6-3046-48aa-8b03-e43b3c529cc1')]",
      "properties": {
        "alertDetailsOverride": {
          "alertDescriptionFormat": "{{UserName}} attempted, and failed, to log into multiple Business Application Studio dev spaces. Tenants accessed: {{Tenants}}",
          "alertDisplayNameFormat": "BTP - Unauthorized access attempt to multiple tenants"
        },
        "alertRuleTemplateName": "74b243a6-3046-48aa-8b03-e43b3c529cc1",
        "customDetails": null,
        "description": "Identifies failed Business Application Studio access attempts over a predefined number of subaccounts.",
        "displayName": "BTP - Failed access attempts across multiple BAS subaccounts",
        "enabled": true,
        "entityMappings": [
          {
            "entityType": "Account",
            "fieldMappings": [
              {
                "columnName": "AccountName",
                "identifier": "Name"
              },
              {
                "columnName": "UPNSuffix",
                "identifier": "UPNSuffix"
              }
            ]
          },
          {
            "entityType": "CloudApplication",
            "fieldMappings": [
              {
                "columnName": "CloudApp",
                "identifier": "Name"
              }
            ]
          }
        ],
        "eventGroupingSettings": {
          "aggregationKind": "SingleAlert"
        },
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SAP BTP/Analytic Rules/BTP - Failed access attempts across multiple BAS subaccounts.yaml",
        "query": "let subaccount_detection_threshold = 3;\nSAPBTPAuditLog_CL\n| where Category == \"audit.security-events\" and Message has \"Unauthorized access attempt\"\n| summarize Start=min(UpdatedOn), End=max(UpdatedOn), Tenants = make_set(Tenant, 100) by UserName\n| where array_length(Tenants) > subaccount_detection_threshold\n| project Start, End, UserName, Tenants, CloudApp = \"SAP BTP\"\n| extend AccountName = split(UserName, \"@\")[0], UPNSuffix = split(UserName, \"@\")[1]\n",
        "queryFrequency": "PT1H",
        "queryPeriod": "PT1H",
        "severity": "Medium",
        "status": "Available",
        "subTechniques": [],
        "suppressionDuration": "PT1H",
        "suppressionEnabled": false,
        "tactics": [
          "Discovery",
          "Reconnaissance"
        ],
        "techniques": [
          "T1526",
          "T1595"
        ],
        "templateVersion": "3.0.5",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}