1Password - Disable MFA factor or type for all user accounts
| Id | 92ab0938-1e7c-4671-9810-392e8b9714da |
| Rulename | 1Password - Disable MFA factor or type for all user accounts |
| Description | This will alert when the MFA factor or type for all user accounts are disabled. Once this analytics rule is triggered it will group all related future alerts for upto an hour when all related entities are the same. Ref: https://1password.com/ Ref: https://github.com/securehats/ |
| Severity | High |
| Tactics | DefenseEvasion |
| Techniques | T1556 |
| Required data connectors | 1Password |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/1Password/Analytics Rules/1Password - Disable MFA factor or type for all user accounts.yaml |
| Version | 1.0.0 |
| Arm template | 92ab0938-1e7c-4671-9810-392e8b9714da.json |
OnePasswordEventLogs_CL
| where log_source == "auditevents"
| where action == "disblmfa"
| where object_type == "account"
| extend
ActorUsername = actor_details.email
, SrcIpAddr = session.ip
id: 92ab0938-1e7c-4671-9810-392e8b9714da
triggerOperator: gt
entityMappings:
- fieldMappings:
- identifier: FullName
columnName: ActorUsername
entityType: Account
- fieldMappings:
- identifier: Address
columnName: SrcIpAddr
entityType: IP
eventGroupingSettings:
aggregationKind: SingleAlert
requiredDataConnectors:
- dataTypes:
- OnePasswordEventLogs_CL
connectorId: 1Password
queryFrequency: 5m
suppressionEnabled: false
queryPeriod: 5m
triggerThreshold: 0
incidentConfiguration:
groupingConfiguration:
enabled: true
reopenClosedIncident: false
matchingMethod: AllEntities
lookbackDuration: 1h
createIncident: true
query: |-
OnePasswordEventLogs_CL
| where log_source == "auditevents"
| where action == "disblmfa"
| where object_type == "account"
| extend
ActorUsername = actor_details.email
, SrcIpAddr = session.ip
name: 1Password - Disable MFA factor or type for all user accounts
kind: Scheduled
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/1Password/Analytics Rules/1Password - Disable MFA factor or type for all user accounts.yaml
tactics:
- DefenseEvasion
severity: High
relevantTechniques:
- T1556
suppressionDuration: 5h
version: 1.0.0
description: |-
This will alert when the MFA factor or type for all user accounts are disabled. Once this analytics rule is triggered it will group all related future alerts for upto an hour when all related entities are the same.
Ref: https://1password.com/
Ref: https://github.com/securehats/