Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Keeper Security - User MFA Changed

Back
Id75ffc8a4-86db-4f48-8506-cb4c049be484
RulenameKeeper Security - User MFA Changed
DescriptionCreates an informational incident based on Keeper Security User MFA Changed data in Microsoft Sentinel
SeverityInformational
TacticsPersistence
TechniquesT1556
Required data connectorsKeeperSecurityPush2
KindNRT
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Keeper Security/Analytic Rules/Keeper Security - User MFA Changed.yaml
Version1.0.3
Arm template75ffc8a4-86db-4f48-8506-cb4c049be484.json
Deploy To Azure
KeeperSecurityEventNewLogs_CL
| where AuditEvent in (```set_two_factor_off```, ```set_two_factor_on```)
eventGroupingSettings:
  aggregationKind: AlertPerResult
entityMappings:
- entityType: Account
  fieldMappings:
  - identifier: FullName
    columnName: Username
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: RemoteAddress
requiredDataConnectors:
- dataTypes:
  - KeeperSecurityEventNewLogs_CL
  connectorId: KeeperSecurityPush2
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Keeper Security/Analytic Rules/Keeper Security - User MFA Changed.yaml
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    enabled: false
    reopenClosedIncident: false
    matchingMethod: AllEntities
    lookbackDuration: PT5H
version: 1.0.3
relevantTechniques:
- T1556
status: Available
suppressionEnabled: false
severity: Informational
kind: NRT
id: 75ffc8a4-86db-4f48-8506-cb4c049be484
query: |
  KeeperSecurityEventNewLogs_CL
  | where AuditEvent in (```set_two_factor_off```, ```set_two_factor_on```)  
description: |
    'Creates an informational incident based on Keeper Security User MFA Changed data in Microsoft Sentinel'
suppressionDuration: PT5H
name: Keeper Security - User MFA Changed
alertDetailsOverride:
  alertDisplayNameFormat: '{{AuditEvent}} on {{RemoteAddress}}'
  alertDescriptionFormat: '{{AuditEvent}} has been captured in the Keeper Security Event Logs'
tactics:
- Persistence