Trust Monitor Event
| Id | 8dcf7238-a7d0-4cfd-8d0c-b230e3cd9182 |
| Rulename | Trust Monitor Event |
| Description | This query identifies when a new trust monitor event is detected. |
| Severity | Medium |
| Tactics | CredentialAccess |
| Techniques | T1528 T1555 |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Detections/DuoSecurity/TrustMonitorEvent.yaml |
| Version | 1.0.4 |
| Arm template | 8dcf7238-a7d0-4cfd-8d0c-b230e3cd9182.json |
let timeframe = ago(5m);
DuoSecurityTrustMonitor_CL
| where TimeGenerated >= timeframe
| extend AccountName = tostring(split(surfaced_auth_user_name_s, "@")[0]), AccountUPNSuffix = tostring(split(surfaced_auth_user_name_s, "@")[1])
relevantTechniques:
- T1528
- T1555
entityMappings:
- fieldMappings:
- columnName: surfaced_auth_user_name_s
identifier: FullName
- columnName: AccountName
identifier: Name
- columnName: AccountUPNSuffix
identifier: UPNSuffix
entityType: Account
- fieldMappings:
- columnName: surfaced_auth_access_device_ip_s
identifier: Address
entityType: IP
triggerThreshold: 0
description: |
'This query identifies when a new trust monitor event is detected.'
metadata:
author:
name: SecurityJedi
source:
kind: Community
categories:
domains:
- Security - Others
support:
tier: Community
requiredDataConnectors: []
triggerOperator: gt
version: 1.0.4
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Detections/DuoSecurity/TrustMonitorEvent.yaml
id: 8dcf7238-a7d0-4cfd-8d0c-b230e3cd9182
queryFrequency: 5m
query: |
let timeframe = ago(5m);
DuoSecurityTrustMonitor_CL
| where TimeGenerated >= timeframe
| extend AccountName = tostring(split(surfaced_auth_user_name_s, "@")[0]), AccountUPNSuffix = tostring(split(surfaced_auth_user_name_s, "@")[1])
severity: Medium
queryPeriod: 5m
name: Trust Monitor Event
tactics:
- CredentialAccess
kind: Scheduled