Dataverse - Terminated employee exfiltration to USB drive
| Id | c5e75cb6-cea0-49c2-a998-da414035aac1 |
| Rulename | Dataverse - Terminated employee exfiltration to USB drive |
| Description | Identifies files downloaded from Dataverse by departing or terminated employees which are copied to USB mounted drives. |
| Severity | High |
| Tactics | Exfiltration |
| Techniques | T1052 |
| Required data connectors | Dataverse MicrosoftThreatProtection |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 14d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Business Applications/Analytic Rules/Dataverse - Terminated employee exfiltration to USB drive.yaml |
| Version | 3.2.0 |
| Arm template | c5e75cb6-cea0-49c2-a998-da414035aac1.json |
let drive_mount_lookback = 14d;
let query_frequency = 1h;
DataverseActivity
| distinct InstanceUrl
| join kind=inner (DeviceFileEvents
| where TimeGenerated >= ago(query_frequency))
on $left.InstanceUrl == $right.FileOriginUrl
| join kind=inner (MSBizAppsTerminatedEmployees()) on $left.InitiatingProcessAccountUpn == $right.UserPrincipalName
| join kind=inner (DeviceEvents
| where TimeGenerated >= ago(drive_mount_lookback)
| where ActionType == "UsbDriveMounted"
| extend DriveLetter = tostring(AdditionalFields.DriveLetter)
| summarize MountedDriveLetters = make_set(DriveLetter, 26) by DeviceId, DeviceName)
on DeviceId
| extend TargetDriveLetter = tostring(split(FolderPath, "\\")[0])
| where set_has_element(MountedDriveLetters, TargetDriveLetter)
| join kind=inner (DeviceInfo
| summarize arg_max(TimeGenerated, DeviceId, PublicIP) by DeviceName)
on DeviceId
| project-rename
UserId = UserPrincipalName
| summarize LatestEvent = arg_max(TimeGenerated, *), Files = make_set(FileName, 100) by UserId, InstanceUrl
| extend
CloudAppId = int(32780),
AccountName = tostring(split(UserId, '@')[0]),
UPNSuffix = tostring(split(UserId, '@')[1])
| project
LatestEvent,
UserId,
PublicIP,
Files,
InstanceUrl,
CloudAppId,
AccountName,
UPNSuffix
queryPeriod: 14d
query: |
let drive_mount_lookback = 14d;
let query_frequency = 1h;
DataverseActivity
| distinct InstanceUrl
| join kind=inner (DeviceFileEvents
| where TimeGenerated >= ago(query_frequency))
on $left.InstanceUrl == $right.FileOriginUrl
| join kind=inner (MSBizAppsTerminatedEmployees()) on $left.InitiatingProcessAccountUpn == $right.UserPrincipalName
| join kind=inner (DeviceEvents
| where TimeGenerated >= ago(drive_mount_lookback)
| where ActionType == "UsbDriveMounted"
| extend DriveLetter = tostring(AdditionalFields.DriveLetter)
| summarize MountedDriveLetters = make_set(DriveLetter, 26) by DeviceId, DeviceName)
on DeviceId
| extend TargetDriveLetter = tostring(split(FolderPath, "\\")[0])
| where set_has_element(MountedDriveLetters, TargetDriveLetter)
| join kind=inner (DeviceInfo
| summarize arg_max(TimeGenerated, DeviceId, PublicIP) by DeviceName)
on DeviceId
| project-rename
UserId = UserPrincipalName
| summarize LatestEvent = arg_max(TimeGenerated, *), Files = make_set(FileName, 100) by UserId, InstanceUrl
| extend
CloudAppId = int(32780),
AccountName = tostring(split(UserId, '@')[0]),
UPNSuffix = tostring(split(UserId, '@')[1])
| project
LatestEvent,
UserId,
PublicIP,
Files,
InstanceUrl,
CloudAppId,
AccountName,
UPNSuffix
version: 3.2.0
name: Dataverse - Terminated employee exfiltration to USB drive
entityMappings:
- fieldMappings:
- columnName: AccountName
identifier: Name
- columnName: UPNSuffix
identifier: UPNSuffix
entityType: Account
- fieldMappings:
- columnName: PublicIP
identifier: Address
entityType: IP
- fieldMappings:
- columnName: CloudAppId
identifier: AppId
- columnName: InstanceUrl
identifier: InstanceName
entityType: CloudApplication
eventGroupingSettings:
aggregationKind: AlertPerResult
queryFrequency: 1h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Business Applications/Analytic Rules/Dataverse - Terminated employee exfiltration to USB drive.yaml
alertDetailsOverride:
alertDisplayNameFormat: Dataverse - terminated user copied files from {{InstanceUrl}} to USB
alertDescriptionFormat: '{{UserId}} , on the TerminatedUsers watchlist, was found to copy files to a USB mounted drive.'
description: Identifies files downloaded from Dataverse by departing or terminated employees which are copied to USB mounted drives.
kind: Scheduled
status: Available
severity: High
requiredDataConnectors:
- connectorId: Dataverse
dataTypes:
- DataverseActivity
- connectorId: MicrosoftThreatProtection
dataTypes:
- DeviceInfo
- DeviceEvents
- DeviceFileEvents
triggerOperator: gt
triggerThreshold: 0
customDetails: {}
tactics:
- Exfiltration
id: c5e75cb6-cea0-49c2-a998-da414035aac1
relevantTechniques:
- T1052