NordPassEventLogs_CL
| where event_type == "integrations"
| where action == "activities_token_revoked"
| extend TargetEmail = user_email
description: This will alert you when the event reporting token is revoked, posing the risk of active integration being blocked.
displayName: Activity token revocation
tactics:
- DefenseEvasion
requiredDataConnectors:
- connectorId: NordPass
dataTypes:
- NordPassEventLogs_CL
incidentConfiguration:
createIncident: false
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/NordPass/Analytics Rules/nordpass_token_revoked.yaml
severity: Medium
name: NordPass - Activity token revocation
triggerThreshold: 0
queryPeriod: 1h
query: |
NordPassEventLogs_CL
| where event_type == "integrations"
| where action == "activities_token_revoked"
| extend TargetEmail = user_email
relevantTechniques:
- T1134
id: 800314a6-759a-4575-93e2-1e080b1d33f9
queryFrequency: 1h
entityMappings:
- entityType: Mailbox
fieldMappings:
- columnName: TargetEmail
identifier: MailboxPrimaryAddress
triggerOperator: gt
version: 1.0.0
kind: Scheduled