Insider Risk_Sensitive Data Access Outside Organizational Geo-location
Id | b81ed294-28cf-48c3-bac8-ac60dcef293b |
Rulename | Insider Risk_Sensitive Data Access Outside Organizational Geo-location |
Description | This alert joins Azure Information Protection Logs (InformationProtectionLogs_CL) with Azure Active Directory Sign in Logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include User Principal Name, Label Name, Activity, City, State, Country/Region, and Time Generated. Recommended configuration is to include (or exclude) Sign in geo-locations (City, State, Country and/or Region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review. For more information see Sign-in logs in Azure Active Directory: Location Filtering |
Severity | High |
Tactics | Exfiltration |
Techniques | T1567 |
Required data connectors | AzureActiveDirectory AzureInformationProtection |
Kind | Scheduled |
Query frequency | 6h |
Query period | 6h |
Trigger threshold | 0 |
Trigger operator | gt |
Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/MicrosoftPurviewInsiderRiskManagement/Analytic Rules/InsiderRiskSensitiveDataAccessOutsideOrgGeo.yaml |
Version | 1.1.1 |
Arm template | b81ed294-28cf-48c3-bac8-ac60dcef293b.json |
InformationProtectionLogs_CL
| extend UserPrincipalName = UserId_s
| where LabelName_s <> ""
| join kind=inner (SigninLogs) on UserPrincipalName
| extend City = tostring(LocationDetails.city)
// | where City <> "New York" // Configure Location Details within Organizational Requirements
| extend State = tostring(LocationDetails.state)
// | where State <> "Texas" // Configure Location Details within Organizational Requirements
| extend Country_Region = tostring(LocationDetails.countryOrRegion)
// | where Country_Region <> "US" // Configure Location Details within Organizational Requirements
// | lookup kind=inner _GetWatchlist('<Your Watchlist Name>') on $left.UserPrincipalName == $right.SearchKey
| summarize count() by UserPrincipalName, LabelName_s, Activity_s, City, State, Country_Region, TimeGenerated
| sort by count_ desc
| extend AccountCustomEntity = UserPrincipalName
requiredDataConnectors:
- connectorId: AzureInformationProtection
dataTypes:
- InformationProtectionLogs_CL
- connectorId: AzureActiveDirectory
dataTypes:
- SigninLogs
triggerOperator: gt
queryFrequency: 6h
name: Insider Risk_Sensitive Data Access Outside Organizational Geo-location
queryPeriod: 6h
id: b81ed294-28cf-48c3-bac8-ac60dcef293b
description: |
'This alert joins Azure Information Protection Logs (InformationProtectionLogs_CL) with Azure Active Directory Sign in Logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include User Principal Name, Label Name, Activity, City, State, Country/Region, and Time Generated. Recommended configuration is to include (or exclude) Sign in geo-locations (City, State, Country and/or Region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review. For more information see [Sign-in logs in Azure Active Directory: Location Filtering](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-sign-ins)'
version: 1.1.1
severity: High
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/MicrosoftPurviewInsiderRiskManagement/Analytic Rules/InsiderRiskSensitiveDataAccessOutsideOrgGeo.yaml
query: |
InformationProtectionLogs_CL
| extend UserPrincipalName = UserId_s
| where LabelName_s <> ""
| join kind=inner (SigninLogs) on UserPrincipalName
| extend City = tostring(LocationDetails.city)
// | where City <> "New York" // Configure Location Details within Organizational Requirements
| extend State = tostring(LocationDetails.state)
// | where State <> "Texas" // Configure Location Details within Organizational Requirements
| extend Country_Region = tostring(LocationDetails.countryOrRegion)
// | where Country_Region <> "US" // Configure Location Details within Organizational Requirements
// | lookup kind=inner _GetWatchlist('<Your Watchlist Name>') on $left.UserPrincipalName == $right.SearchKey
| summarize count() by UserPrincipalName, LabelName_s, Activity_s, City, State, Country_Region, TimeGenerated
| sort by count_ desc
| extend AccountCustomEntity = UserPrincipalName
incidentConfiguration:
groupingConfiguration:
matchingMethod: Selected
reopenClosedIncident: true
groupByEntities:
- Account
enabled: true
lookbackDuration: 3d
createIncident: true
kind: Scheduled
eventGroupingSettings:
aggregationKind: SingleAlert
entityMappings:
- entityType: Account
fieldMappings:
- identifier: AadUserId
columnName: AccountCustomEntity
relevantTechniques:
- T1567
tactics:
- Exfiltration
triggerThreshold: 0
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/b81ed294-28cf-48c3-bac8-ac60dcef293b')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/b81ed294-28cf-48c3-bac8-ac60dcef293b')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-11-01-preview",
"properties": {
"displayName": "Insider Risk_Sensitive Data Access Outside Organizational Geo-location",
"description": "'This alert joins Azure Information Protection Logs (InformationProtectionLogs_CL) with Azure Active Directory Sign in Logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include User Principal Name, Label Name, Activity, City, State, Country/Region, and Time Generated. Recommended configuration is to include (or exclude) Sign in geo-locations (City, State, Country and/or Region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review. For more information see [Sign-in logs in Azure Active Directory: Location Filtering](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-sign-ins)'\n",
"severity": "High",
"enabled": true,
"query": "InformationProtectionLogs_CL\n| extend UserPrincipalName = UserId_s\n| where LabelName_s <> \"\"\n| join kind=inner (SigninLogs) on UserPrincipalName\n| extend City = tostring(LocationDetails.city)\n// | where City <> \"New York\" // Configure Location Details within Organizational Requirements\n| extend State = tostring(LocationDetails.state)\n// | where State <> \"Texas\" // Configure Location Details within Organizational Requirements\n| extend Country_Region = tostring(LocationDetails.countryOrRegion)\n// | where Country_Region <> \"US\" // Configure Location Details within Organizational Requirements\n// | lookup kind=inner _GetWatchlist('<Your Watchlist Name>') on $left.UserPrincipalName == $right.SearchKey\n| summarize count() by UserPrincipalName, LabelName_s, Activity_s, City, State, Country_Region, TimeGenerated\n| sort by count_ desc\n| extend AccountCustomEntity = UserPrincipalName\n",
"queryFrequency": "PT6H",
"queryPeriod": "PT6H",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"tactics": [
"Exfiltration"
],
"techniques": [
"T1567"
],
"alertRuleTemplateName": "b81ed294-28cf-48c3-bac8-ac60dcef293b",
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": true,
"reopenClosedIncident": true,
"lookbackDuration": "P3D",
"groupByEntities": [
"Account"
],
"matchingMethod": "Selected"
}
},
"eventGroupingSettings": {
"aggregationKind": "SingleAlert"
},
"customDetails": null,
"entityMappings": [
{
"fieldMappings": [
{
"identifier": "AadUserId",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
}
],
"OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/MicrosoftPurviewInsiderRiskManagement/Analytic Rules/InsiderRiskSensitiveDataAccessOutsideOrgGeo.yaml",
"templateVersion": "1.1.1"
}
}
]
}