let isAdmin = true;
GitLabAudit
| where AuthenticationType == "standard" and ((isAdmin and TargetDetails contains "Administrator") or (isAdmin==false));
status: Available
queryFrequency: 1h
id: e0b45487-5c79-482d-8ac0-695de8c031af
tactics:
- CredentialAccess
entityMappings:
- fieldMappings:
- columnName: IPAddress
identifier: Address
entityType: IP
- fieldMappings:
- columnName: AuthorUserName
identifier: FullName
entityType: Account
requiredDataConnectors:
- connectorId: SyslogAma
dataTypes:
- Syslog
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GitLab/Analytic Rules/GitLab_LocalAuthNoMFA.yaml
version: 1.0.1
query: |
let isAdmin = true;
GitLabAudit
| where AuthenticationType == "standard" and ((isAdmin and TargetDetails contains "Administrator") or (isAdmin==false));
description: |
'This query checks GitLab Audit Logs to see if a user authenticated without MFA. Ot might mean that MFA was disabled for the GitLab server or that an external authentication provider was bypassed. This rule focuses on 'admin' privileges but the parameter can be adapted to also include all users.'
relevantTechniques:
- T1110
triggerThreshold: 0
queryPeriod: 1d
triggerOperator: gt
name: GitLab - Local Auth - No MFA
severity: Medium
kind: Scheduled