Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

CredentialAccess

Overview

Rule NameidRequired data connectorsId
1Password - Secret extraction post vault access change by administrator6711b747-16d7-4df4-9f61-8633617f45d71Password6711b747-16d7-4df4-9f61-8633617f45d7
1Password - Vault export post account creation969e2e5c-9cc6-423c-a3de-514f7ad75fe71Password969e2e5c-9cc6-423c-a3de-514f7ad75fe7
1Password - Vault export prior to account suspension or deletion51617533-cf51-4415-9020-b15bd47d69d21Password51617533-cf51-4415-9020-b15bd47d69d2
1Password - Vault exportdae4c601-51c9-47f5-83d3-e6eaef929cf61Passworddae4c601-51c9-47f5-83d3-e6eaef929cf6
API - Account Takeover25c86f99-0a91-4b7f-88f3-599a008e5ab842CrunchAPIProtection25c86f99-0a91-4b7f-88f3-599a008e5ab8
API - JWT validationbbd163f4-1f56-434f-9c23-b06713c119c242CrunchAPIProtectionbbd163f4-1f56-434f-9c23-b06713c119c2
API - Password Crackingd951d64d-0ecd-4675-8c79-6c870d5f72ac42CrunchAPIProtectiond951d64d-0ecd-4675-8c79-6c870d5f72ac
API - Suspicious Login7bdc10d6-aa24-4ca9-9a93-802cd876135442CrunchAPIProtection7bdc10d6-aa24-4ca9-9a93-802cd8761354
Alsid Active Directory attacks pathways9649e203-3cb7-47ff-89a9-42f2a5eefe31AlsidForAD9649e203-3cb7-47ff-89a9-42f2a5eefe31
Alsid DCSyncd3c658bd-8da9-4372-82e4-aaffa922f428AlsidForADd3c658bd-8da9-4372-82e4-aaffa922f428
Alsid Golden Ticket21ab3f52-6d79-47e3-97f8-ad65f2cb29fbAlsidForAD21ab3f52-6d79-47e3-97f8-ad65f2cb29fb
Alsid Indicators of Attack3caa67ef-8ed3-4ab5-baf2-3850d3667f3dAlsidForAD3caa67ef-8ed3-4ab5-baf2-3850d3667f3d
Alsid Indicators of Exposures154fde9f-ae00-4422-a8da-ef00b11da3fcAlsidForAD154fde9f-ae00-4422-a8da-ef00b11da3fc
Alsid LSASS Memory3acf5617-7c41-4085-9a79-cc3a425ba83aAlsidForAD3acf5617-7c41-4085-9a79-cc3a425ba83a
Alsid Password Guessingba239935-42c2-472d-80ba-689186099ea1AlsidForADba239935-42c2-472d-80ba-689186099ea1
Alsid Password issues472b7cf4-bf1a-4061-b9ab-9fe4894e3c17AlsidForAD472b7cf4-bf1a-4061-b9ab-9fe4894e3c17
Alsid Password Spraying9e20eb4e-cc0d-4349-a99d-cad756859dfbAlsidForAD9e20eb4e-cc0d-4349-a99d-cad756859dfb
Alsid privileged accounts issuesa5fe9489-cf8b-47ae-a87e-8f3a13e4203eAlsidForADa5fe9489-cf8b-47ae-a87e-8f3a13e4203e
Alsid user accounts issuesfb9e0b51-8867-48d7-86f4-6e76f2176bf8AlsidForADfb9e0b51-8867-48d7-86f4-6e76f2176bf8
Credential Dumping Tools - Service Installation4ebbb5c2-8802-11ec-a8a3-0242ac120002SecurityEvents
WindowsSecurityEvents
4ebbb5c2-8802-11ec-a8a3-0242ac120002
Credential Dumping Tools - File Artifacts32ffb19e-8ed8-40ed-87a0-1adb4746b7c4SecurityEvents
WindowsSecurityEvents
32ffb19e-8ed8-40ed-87a0-1adb4746b7c4
Powershell Empire Cmdlets Executed in Command Lineef88eb96-861c-43a0-ab16-f3835a97c928SecurityEvents
WindowsSecurityEvents
WindowsForwardedEvents
ef88eb96-861c-43a0-ab16-f3835a97c928
Password Exfiltration over SCIM application2e3c4ad5-8cb3-4b46-88ff-a88367ee7eaaAuthomize2e3c4ad5-8cb3-4b46-88ff-a88367ee7eaa
AWS Security Hub - Detect root user lacking MFA6b3b9b1d-0d5d-4d4a-9f0f-8d1e2c7a5f44AWSSecurityHub6b3b9b1d-0d5d-4d4a-9f0f-8d1e2c7a5f44
Microsoft Entra ID Hybrid Health AD FS Suspicious Applicationd9938c3b-16f9-444d-bc22-ea9a9110e0fdAzureActivityd9938c3b-16f9-444d-bc22-ea9a9110e0fd
Rare subscription-level operations in Azure23de46ea-c425-4a77-b456-511ae4855d69AzureActivity23de46ea-c425-4a77-b456-511ae4855d69
Mass secret retrieval from Azure Key Vault24f8c234-d1ff-40ec-8b73-96b17a3a9c1cAzureKeyVault24f8c234-d1ff-40ec-8b73-96b17a3a9c1c
Azure Key Vault access TimeSeries anomaly0914adab-90b5-47a3-a79f-7cdcac843aa7AzureKeyVault0914adab-90b5-47a3-a79f-7cdcac843aa7
Azure DevOps PAT used with Browser5f0d80db-3415-4265-9d52-8466b7372e3a5f0d80db-3415-4265-9d52-8466b7372e3a
Azure DevOps Variable Secret Not Secured4ca74dc0-8352-4ac5-893c-73571cc783314ca74dc0-8352-4ac5-893c-73571cc78331
Bitglass - Multiple failed logins7c570bfc-9f20-490e-80e8-b898c7ce4bdaBitglass7c570bfc-9f20-490e-80e8-b898c7ce4bda
CiscoISE - Certificate has expired6107cba5-2974-4c22-8222-2a6f7bbea664SyslogAma6107cba5-2974-4c22-8222-2a6f7bbea664
Multi-Factor Authentication Disabled for a User65c78944-930b-4cae-bd79-c3664ae30ba7AzureActiveDirectory
AWS
65c78944-930b-4cae-bd79-c3664ae30ba7
Contrast ADR - DLP SQL Injection Correlation1aac7737-d52f-483d-b225-6a27c1b29a9eContrastADR1aac7737-d52f-483d-b225-6a27c1b29a9e
Corelight - Forced External Outbound SMB73f23aa2-5cc4-4507-940b-75c9092e9e01Corelight73f23aa2-5cc4-4507-940b-75c9092e9e01
Compromised Cards (High)2d5481d3-4aad-4ab8-bfea-6da5d6db9fe7CBSPollingIDAzureFunctions2d5481d3-4aad-4ab8-bfea-6da5d6db9fe7
Compromised Cards (Informational)02536cb0-a292-4b30-917b-abfd31a39e14CBSPollingIDAzureFunctions02536cb0-a292-4b30-917b-abfd31a39e14
Compromised Cards (Low)970a9ae9-2e9b-4a51-a1f0-b76acd28f62fCBSPollingIDAzureFunctions970a9ae9-2e9b-4a51-a1f0-b76acd28f62f
Compromised Cards (Medium)1436c4c5-9304-4d0b-92cd-107e29ec4ef9CBSPollingIDAzureFunctions1436c4c5-9304-4d0b-92cd-107e29ec4ef9
Cookies: HttpOnly Flag Not Usede303d68e-08a7-4382-ab31-6a4bd80e8066HVPollingIDAzureFunctionse303d68e-08a7-4382-ab31-6a4bd80e8066
Cookies: Secure Flag Not Used91da8421-6066-4570-8a0b-25d980810109HVPollingIDAzureFunctions91da8421-6066-4570-8a0b-25d980810109
Header: HTTP Strict Transport Security Missinga3efb9ff-14a4-42ef-b019-0b9cbe5d3888HVPollingIDAzureFunctionsa3efb9ff-14a4-42ef-b019-0b9cbe5d3888
Header: Referrer-Policy Missing5ee7098a-f0d8-46bf-806d-25015145e24fHVPollingIDAzureFunctions5ee7098a-f0d8-46bf-806d-25015145e24f
Leaked Credential (Informational)296e0e78-d744-407f-b543-4adf3eed1030CBSPollingIDAzureFunctions296e0e78-d744-407f-b543-4adf3eed1030
Leaked Credential (Low)425007a5-b0e8-4f1a-9bb9-20aac8e97cd7CBSPollingIDAzureFunctions425007a5-b0e8-4f1a-9bb9-20aac8e97cd7
Leaked Credential (Medium)51546727-6467-439e-8799-4cf0232394ebCBSPollingIDAzureFunctions51546727-6467-439e-8799-4cf0232394eb
Leaked Credentiala0a46e91-3f94-4ed4-ab70-ecd36ae0ead0CBSPollingIDAzureFunctionsa0a46e91-3f94-4ed4-ab70-ecd36ae0ead0
Money Mule Account (High)f24f7b7a-74cc-4f7a-a1d9-e2b22ab41eacCBSPollingIDAzureFunctionsf24f7b7a-74cc-4f7a-a1d9-e2b22ab41eac
Money Mule Account (Informational)65c395f5-e20b-432c-85d8-388b65d0e8baCBSPollingIDAzureFunctions65c395f5-e20b-432c-85d8-388b65d0e8ba
Money Mule Account (Low)04fab81c-8cf3-4c9d-80dc-a789e52525a2CBSPollingIDAzureFunctions04fab81c-8cf3-4c9d-80dc-a789e52525a2
Money Mule Account (Medium)249aa6df-5f52-46d9-a908-c28c00db1ceeCBSPollingIDAzureFunctions249aa6df-5f52-46d9-a908-c28c00db1cee
Social Engineering Vulnerability (High)4df9c385-9a5b-4585-8dae-ad3c82066108CBSPollingIDAzureFunctions4df9c385-9a5b-4585-8dae-ad3c82066108
TLS Certificate Hostname Mismatch69761091-1a9a-49a9-8966-be68cd550766HVPollingIDAzureFunctions69761091-1a9a-49a9-8966-be68cd550766
TLS Certificate Using Weak Cipher - Informational1bdf3cba-6b85-4b88-ab1e-681bac20d41fHVPollingIDAzureFunctions1bdf3cba-6b85-4b88-ab1e-681bac20d41f
TLS Certificate Using Weak Cipher - Medium7bbe51fe-9c5f-4f54-a079-b84cc27737a1HVPollingIDAzureFunctions7bbe51fe-9c5f-4f54-a079-b84cc27737a1
TLSv1.1 in Use - info049edfdd-0331-4493-bcd7-b375bba7b551HVPollingIDAzureFunctions049edfdd-0331-4493-bcd7-b375bba7b551
TLSv1.1 in Use - Medium92400070-199b-46d3-bd86-2fb8421b5338HVPollingIDAzureFunctions92400070-199b-46d3-bd86-2fb8421b5338
TLSv1 in Use - Low9435d04a-e8a6-49e5-90c4-e7f3456f9ed5HVPollingIDAzureFunctions9435d04a-e8a6-49e5-90c4-e7f3456f9ed5
TLSv1 in Use - Medium93f2ab34-15a3-4199-ad5a-6ebf8d2ad449HVPollingIDAzureFunctions93f2ab34-15a3-4199-ad5a-6ebf8d2ad449
Unauthorized Association (High)0e90d290-2422-49a8-8025-a24dd453e48eCBSPollingIDAzureFunctions0e90d290-2422-49a8-8025-a24dd453e48e
Unauthorized Association (Informational)dfdeca9d-c827-49f6-bf46-48520ee9c06fCBSPollingIDAzureFunctionsdfdeca9d-c827-49f6-bf46-48520ee9c06f
Unauthorized Association (Low)a793865b-6877-4449-b4a8-6d3c60e141c7CBSPollingIDAzureFunctionsa793865b-6877-4449-b4a8-6d3c60e141c7
Unauthorized Association (Medium)4999feef-84af-4510-a2c8-91265873b552CBSPollingIDAzureFunctions4999feef-84af-4510-a2c8-91265873b552
CyberArk - Multiple Failed Actions Followed by Success (15m)
CYFIRMA - Attack Surface - Weak Certificate Exposure - High Rule3b5a1c0e-7f3a-4d47-8416-6c0b8b91e9ceCyfirmaAttackSurfaceAlertsConnector3b5a1c0e-7f3a-4d47-8416-6c0b8b91e9ce
CYFIRMA - Attack Surface - Weak Certificate Exposure - Medium Rule5a617ff2-3e3d-44e7-b761-9f0d542ae191CyfirmaAttackSurfaceAlertsConnector5a617ff2-3e3d-44e7-b761-9f0d542ae191
CYFIRMA - Attack Surface - Configuration High Rule30206b45-75d2-4c6a-87c5-f0861c1f2870CyfirmaAttackSurfaceAlertsConnector30206b45-75d2-4c6a-87c5-f0861c1f2870
CYFIRMA - Attack Surface - Configuration Medium Rulee1f88d08-5c32-4d35-a8ce-2f21cdb4b6deCyfirmaAttackSurfaceAlertsConnectore1f88d08-5c32-4d35-a8ce-2f21cdb4b6de
CYFIRMA - Brand Intelligence - Malicious Mobile App High Rule3176ac89-b195-48b7-a01e-740a6b26fb2fCyfirmaBrandIntelligenceAlertsDC3176ac89-b195-48b7-a01e-740a6b26fb2f
CYFIRMA - Brand Intelligence - Malicious Mobile App Medium Ruleb73e6628-d44c-4ad3-a801-ea225c5744eeCyfirmaBrandIntelligenceAlertsDCb73e6628-d44c-4ad3-a801-ea225c5744ee
CYFIRMA - Compromised Employees Detection Rule72d3fb86-d1eb-44d6-9352-170c6bb45bb7CyfirmaCompromisedAccountsDataConnector72d3fb86-d1eb-44d6-9352-170c6bb45bb7
CYFIRMA - Customer Accounts Leaks Detection Ruleebd1bf8d-aa18-4e66-9cad-555b71a290f1CyfirmaCompromisedAccountsDataConnectorebd1bf8d-aa18-4e66-9cad-555b71a290f1
CYFIRMA - Public Accounts Leaks Detection Rule57602938-e95a-4fc3-9352-8d473ed256e1CyfirmaCompromisedAccountsDataConnector57602938-e95a-4fc3-9352-8d473ed256e1
CYFIRMA - High severity File Hash Indicators with Block Action and Malware990fc0dc-e7a5-4f6d-bc24-8569652cd773CyfirmaCyberIntelligenceDC990fc0dc-e7a5-4f6d-bc24-8569652cd773
CYFIRMA - Medium severity File Hash Indicators with Block Action and Malware24dcff02-123c-4e10-a531-2a22a609120aCyfirmaCyberIntelligenceDC24dcff02-123c-4e10-a531-2a22a609120a
CYFIRMA - High severity Malicious Phishing Network Indicators - Block Recommended Rule6f053867-dbd8-4755-924d-577e3db7f5a6CyfirmaCyberIntelligenceDC6f053867-dbd8-4755-924d-577e3db7f5a6
CYFIRMA - Medium severity Malicious Phishing Network Indicators - Block Recommended Rule5468e012-6681-44fb-be2d-b1cd58b62ac7CyfirmaCyberIntelligenceDC5468e012-6681-44fb-be2d-b1cd58b62ac7
CYFIRMA - High severity Malicious Phishing Network Indicators - Monitor Recommended Rule359e2afb-b6d4-45db-90aa-c89ce7234d72CyfirmaCyberIntelligenceDC359e2afb-b6d4-45db-90aa-c89ce7234d72
CYFIRMA - Medium severity Malicious Phishing Network Indicators - Monitor Recommended Rule1b9603dd-4787-403e-8a35-387c554bd15bCyfirmaCyberIntelligenceDC1b9603dd-4787-403e-8a35-387c554bd15b
CYFIRMA - High severity Trojan File Hash Indicators with Block Action Rule649f525a-1f92-412d-bfc2-ce642e7a7f1fCyfirmaCyberIntelligenceDC649f525a-1f92-412d-bfc2-ce642e7a7f1f
CYFIRMA - Medium severity Trojan File Hash Indicators with Block Action Rule25686f44-5f5f-4388-95e2-eea244481438CyfirmaCyberIntelligenceDC25686f44-5f5f-4388-95e2-eea244481438
CYFIRMA - High severity Trojan File Hash Indicators with Monitor Action Rule4afd8960-8bee-4cac-bb5e-a4f200b1f9f3CyfirmaCyberIntelligenceDC4afd8960-8bee-4cac-bb5e-a4f200b1f9f3
CYFIRMA - Medium severity Trojan File Hash Indicators with Monitor Action Ruleb89c893e-650f-4569-afc3-c487efee2472CyfirmaCyberIntelligenceDCb89c893e-650f-4569-afc3-c487efee2472
CYFIRMA - High severity Trojan Network Indicators - Block Recommended Rule441204ca-274f-43d2-aeda-53409b94f447CyfirmaCyberIntelligenceDC441204ca-274f-43d2-aeda-53409b94f447
CYFIRMA - Medium severity Trojan Network Indicators - Block Recommended Rulebaa63d52-285d-43bf-a34e-8ed2fa260f9eCyfirmaCyberIntelligenceDCbaa63d52-285d-43bf-a34e-8ed2fa260f9e
CYFIRMA - High severity Trojan Network Indicators - Monitor Recommended Rule89fd02b8-3c21-492c-a8de-b3e728d39119CyfirmaCyberIntelligenceDC89fd02b8-3c21-492c-a8de-b3e728d39119
CYFIRMA - Medium severity Trojan Network Indicators - Monitor Recommended Rule104f4574-fc95-4f38-8aa2-02f0b78eba9bCyfirmaCyberIntelligenceDC104f4574-fc95-4f38-8aa2-02f0b78eba9b
CYFIRMA - Data Breach and Web Monitoring - Dark Web High Rulec3f1f55b-7e54-4416-8afc-7d7876b29b0fCyfirmaDigitalRiskAlertsConnectorc3f1f55b-7e54-4416-8afc-7d7876b29b0f
CYFIRMA - Data Breach and Web Monitoring - Dark Web Medium Rulec0afeda7-4832-49a6-8d03-a5d137d513b5CyfirmaDigitalRiskAlertsConnectorc0afeda7-4832-49a6-8d03-a5d137d513b5
CYFIRMA - Social and Public Exposure - Exposure of PII/CII in Public Domain Rule52d71822-41e4-4c21-b36f-400294f2b43aCyfirmaDigitalRiskAlertsConnector52d71822-41e4-4c21-b36f-400294f2b43a
CYFIRMA - Social and Public Exposure - Exposure of PII/CII in Public Domain Ruleb484f224-687f-4406-af8a-ff019f9f2c24CyfirmaDigitalRiskAlertsConnectorb484f224-687f-4406-af8a-ff019f9f2c24
CYFIRMA - Social and Public Exposure - Source Code Exposure on Public Repositories Rule42e6f16a-7773-44cc-8668-8f648bd1aa4fCyfirmaDigitalRiskAlertsConnector42e6f16a-7773-44cc-8668-8f648bd1aa4f
CYFIRMA - Social and Public Exposure - Source Code Exposure on Public Repositories Rule28e315a3-725d-4261-a6c2-e597d51541f4CyfirmaDigitalRiskAlertsConnector28e315a3-725d-4261-a6c2-e597d51541f4
CYFIRMA - High Severity Asset based Vulnerabilities Rule Alert123fad02-6d9e-439e-8241-7a2fffa7e0a5CyfirmaVulnerabilitiesIntelDC123fad02-6d9e-439e-8241-7a2fffa7e0a5
CYFIRMA - Medium Severity Asset based Vulnerabilities Rule Alert6306f2d9-34a3-409a-850d-175b7bdd1ab1CyfirmaVulnerabilitiesIntelDC6306f2d9-34a3-409a-850d-175b7bdd1ab1
CYFIRMA - High Severity Attack Surface based Vulnerabilities Rule Alert6cc62c46-dd44-46d7-8681-8422f780eabdCyfirmaVulnerabilitiesIntelDC6cc62c46-dd44-46d7-8681-8422f780eabd
CYFIRMA - Medium Severity Attack Surface based Vulnerabilities Rule4c1b282b-62f1-4783-bf40-94c44f0ae630CyfirmaVulnerabilitiesIntelDC4c1b282b-62f1-4783-bf40-94c44f0ae630
Cynerio - IoT - Default password84e0ea1f-766d-4775-836a-c0c9cca05085CynerioSecurityEvents84e0ea1f-766d-4775-836a-c0c9cca05085
Cynerio - IoT - Weak password65db1346-6435-4079-bbf4-9a7113c98054CynerioSecurityEvents65db1346-6435-4079-bbf4-9a7113c98054
Dumping LSASS Process Into a Filea7b9df32-1367-402d-b385-882daf6e3020SecurityEvents
WindowsSecurityEvents
a7b9df32-1367-402d-b385-882daf6e3020
WDigest downgrade attackf6502545-ae3a-4232-a8b0-79d87e5c98d7SecurityEvents
WindowsSecurityEvents
f6502545-ae3a-4232-a8b0-79d87e5c98d7
Threats detected by Eset2d8a60aa-c15e-442e-9ce3-ee924889d2a6EsetSMC2d8a60aa-c15e-442e-9ce3-ee924889d2a6
Expired access credentials being used in Azure433c3b0a-7278-4d74-b137-963ac6f9a7e7AzureActiveDirectory433c3b0a-7278-4d74-b137-963ac6f9a7e7
Password Sprayinge00f72ab-fea1-4a31-9ecc-eea6397cd38dMicrosoftThreatProtectione00f72ab-fea1-4a31-9ecc-eea6397cd38d
Flare Leaked Credentials9cb7c337-f170-4af6-b0e8-b6b7552d762dFlare9cb7c337-f170-4af6-b0e8-b6b7552d762d
Flare Infected Device9cb7c337-f176-4af6-b0e8-b6b7552d762dFlare9cb7c337-f176-4af6-b0e8-b6b7552d762d
GitHub Security Vulnerability in Repository5436f471-b03d-41cb-b333-65891f887c435436f471-b03d-41cb-b333-65891f887c43
GitLab - Brute-force Attempts2238d13a-cf05-4973-a83f-d12a25dbb153SyslogAma2238d13a-cf05-4973-a83f-d12a25dbb153
GitLab - Local Auth - No MFAe0b45487-5c79-482d-8ac0-695de8c031afSyslogAmae0b45487-5c79-482d-8ac0-695de8c031af
GitLab - Repository visibility to Public8b291c3d-90ba-4ebf-af2c-0283192d430eSyslogAma8b291c3d-90ba-4ebf-af2c-0283192d430e
GitLab - SSO - Sign-Ins Burst57b1634b-531d-4eab-a456-8b855887428fAzureActiveDirectory57b1634b-531d-4eab-a456-8b855887428f
Google DNS - Exchange online autodiscover abuse424c2aca-5367-4247-917a-5d0f7035e40eGCPDNSDataConnector424c2aca-5367-4247-917a-5d0f7035e40e
GWorkspace - Possible brute force attack8f6cd9a4-5e57-11ec-bf63-0242ac130002GoogleWorkspaceReportsAPI8f6cd9a4-5e57-11ec-bf63-0242ac130002
GWorkspace - Two-step authentification disabled for a userc8cc02d0-5da6-11ec-bf63-0242ac130002GoogleWorkspaceReportsAPIc8cc02d0-5da6-11ec-bf63-0242ac130002
Illusive Incidents Analytic Rule1a7dbcf6-21a2-4255-84b2-c8dbbdca4630Illusive
illusiveAttackManagementSystemAma
CefAma
1a7dbcf6-21a2-4255-84b2-c8dbbdca4630
Highly Sensitive Password Accessedb39e6482-ab7e-4817-813d-ec910b64b26eLastPassb39e6482-ab7e-4817-813d-ec910b64b26e
[Deprecated] - Known Diamond Sleet related maldoc hash3174a9ec-d0ad-4152-8307-94ed04fa450aCiscoASA
PaloAltoNetworks
SecurityEvents
3174a9ec-d0ad-4152-8307-94ed04fa450a
[Deprecated] - Emerald Sleet domains included in DCU takedown70b12a3b-4896-42cb-910c-5ffaf8d7987dDNS
AzureMonitor(VMInsights)
CiscoASA
PaloAltoNetworks
AzureFirewall
Zscaler
InfobloxNIOS
GCPDNSDataConnector
NXLogDnsLogs
CiscoUmbrellaDataConnector
Corelight
70b12a3b-4896-42cb-910c-5ffaf8d7987d
[Deprecated] - Possible Forest Blizzard attempted credential harvesting - Oct 202068271db2-cbe9-4009-b1d3-bb3b5fe5713cOffice36568271db2-cbe9-4009-b1d3-bb3b5fe5713c
[Deprecated] - Known Granite Typhoon domains and hashes26a3b261-b997-4374-94ea-6c37f67f4f39DNS
AzureMonitor(VMInsights)
CiscoASA
PaloAltoNetworks
SecurityEvents
AzureFirewall
Zscaler
InfobloxNIOS
GCPDNSDataConnector
NXLogDnsLogs
CiscoUmbrellaDataConnector
Corelight
26a3b261-b997-4374-94ea-6c37f67f4f39
[Deprecated] - Known Ruby Sleet domains and hashesc87fb346-ea3a-4c64-ba92-3dd383e0f0b5SquidProxy
DNS
AzureMonitor(VMInsights)
CiscoASA
PaloAltoNetworks
AzureFirewall
Zscaler
InfobloxNIOS
GCPDNSDataConnector
NXLogDnsLogs
CiscoUmbrellaDataConnector
Corelight
c87fb346-ea3a-4c64-ba92-3dd383e0f0b5
Dataverse - Anomalous application user activity0820da12-e895-417f-9175-7c256fcfb33eDataverse0820da12-e895-417f-9175-7c256fcfb33e
Dataverse - Login by a sensitive privileged userf327816b-9328-4b17-9290-a02adc2f4928Dataversef327816b-9328-4b17-9290-a02adc2f4928
Dataverse - New Dataverse application user activity type5c768e7d-7e5e-4d57-80d4-3f50c96fbf70Dataverse5c768e7d-7e5e-4d57-80d4-3f50c96fbf70
F&O - Bank account change following network alias reassignmentdccbdb5b-2ce7-4931-bfbe-f1ad6523ee64Dynamics365Financedccbdb5b-2ce7-4931-bfbe-f1ad6523ee64
F&O - Non-interactive account mapped to self or sensitive privileged user5b7cc7f9-fe54-4138-9fb0-d650807345d3Dynamics365Finance5b7cc7f9-fe54-4138-9fb0-d650807345d3
F&O - Unusual sign-in activity using single factor authentication919e939f-95e2-4978-846e-13a721c89ea1AzureActiveDirectory919e939f-95e2-4978-846e-13a721c89ea1
DopplePaymer Procdump1be34fb9-f81b-47ae-84fb-465e6686d76cMicrosoftThreatProtection1be34fb9-f81b-47ae-84fb-465e6686d76c
LSASS Credential Dumping with Procdumpc332b840-61e4-462e-a201-0e2d69bad45dMicrosoftThreatProtectionc332b840-61e4-462e-a201-0e2d69bad45d
Detect Potential Kerberoast Activities12134de5-361b-427c-a1a0-d43f40a593c4MicrosoftThreatProtection12134de5-361b-427c-a1a0-d43f40a593c4
LaZagne Credential Theft7d0d3050-8dac-4b83-bfae-902f7dc0c21cMicrosoftThreatProtection7d0d3050-8dac-4b83-bfae-902f7dc0c21c
Modified domain federation trust settings95dc4ae3-e0f2-48bd-b996-cdd22b90f9afAzureActiveDirectory95dc4ae3-e0f2-48bd-b996-cdd22b90f9af
Password spray attack against ADFSSignInLogs5533fe80-905e-49d5-889a-df27d2c3976dAzureActiveDirectory5533fe80-905e-49d5-889a-df27d2c3976d
Brute Force Attack against GitHub Account97ad74c4-fdd9-4a3f-b6bf-5e28f4f71e06AzureActiveDirectory97ad74c4-fdd9-4a3f-b6bf-5e28f4f71e06
Brute force attack against a Cloud PC3fbc20a4-04c4-464e-8fcb-6667f53e4987AzureActiveDirectory3fbc20a4-04c4-464e-8fcb-6667f53e4987
Conditional Access - A Conditional Access user/group/role exclusion has changed2ce7f00d-3b3c-41b9-ae9a-b79c19d2394eAzureActiveDirectory2ce7f00d-3b3c-41b9-ae9a-b79c19d2394e
Credential added after admin consented to Application707494a5-8e44-486b-90f8-155d1797a8ebAzureActiveDirectory707494a5-8e44-486b-90f8-155d1797a8eb
Distributed Password cracking attempts in Microsoft Entra IDbfb1c90f-8006-4325-98be-c7fffbc254d6AzureActiveDirectorybfb1c90f-8006-4325-98be-c7fffbc254d6
[Deprecated] Explicit MFA Denya22740ec-fc1e-4c91-8de6-c29c6450ad00AzureActiveDirectory
MicrosoftThreatProtection
a22740ec-fc1e-4c91-8de6-c29c6450ad00
Failed login attempts to Azure Portal223db5c1-1bf8-47d8-8806-bed401b356a4AzureActiveDirectory223db5c1-1bf8-47d8-8806-bed401b356a4
Suspicious application consent similar to O365 Attack Toolkitf948a32f-226c-4116-bddd-d95e91d97eb9AzureActiveDirectoryf948a32f-226c-4116-bddd-d95e91d97eb9
Suspicious application consent similar to PwnAuth39198934-62a0-4781-8416-a81265c03fd6AzureActiveDirectory39198934-62a0-4781-8416-a81265c03fd6
MFA Spamming followed by Successful logina8cc6d5c-4e7e-4b48-b4ac-d8a116c62a8bAzureActiveDirectorya8cc6d5c-4e7e-4b48-b4ac-d8a116c62a8b
NRT Modified domain federation trust settings8540c842-5bbc-4a24-9fb2-a836c0e55a51AzureActiveDirectory8540c842-5bbc-4a24-9fb2-a836c0e55a51
Password spray attack against Microsoft Entra ID Seamless SSOfb7ca1c9-e14c-40a3-856e-28f3c14ea1baAzureActiveDirectoryfb7ca1c9-e14c-40a3-856e-28f3c14ea1ba
GitHub Signin Burst from Multiple Locationsd3980830-dd9d-40a5-911f-76b44dfdce16AzureActiveDirectoryd3980830-dd9d-40a5-911f-76b44dfdce16
Brute force attack against Azure Portal28b42356-45af-40a6-a0b4-a554cdfd5d8aAzureActiveDirectory28b42356-45af-40a6-a0b4-a554cdfd5d8a
Password spray attack against Microsoft Entra ID application48607a29-a26a-4abf-8078-a06dbdd174a4AzureActiveDirectory48607a29-a26a-4abf-8078-a06dbdd174a4
Successful logon from IP and failure from a different IP02ef8d7e-fc3a-4d86-a457-650fa571d8d2AzureActiveDirectory
BehaviorAnalytics
02ef8d7e-fc3a-4d86-a457-650fa571d8d2
Suspicious Entra ID Joined Device Update3a3c6835-0086-40ca-b033-a93bf26d878fAzureActiveDirectory3a3c6835-0086-40ca-b033-a93bf26d878f
Suspicious application consent for offline access3533f74c-9207-4047-96e2-0eb9383be587AzureActiveDirectory3533f74c-9207-4047-96e2-0eb9383be587
Suspicious Service Principal creation activity6852d9da-8015-4b95-8ecf-d9572ee0395dAzureActiveDirectory6852d9da-8015-4b95-8ecf-d9572ee0395d
Mimecast Audit - Logon Authentication Failedf00197ab-491f-41e7-9e22-a7003a4c1e54MimecastAuditAPIf00197ab-491f-41e7-9e22-a7003a4c1e54
Mimecast Audit - Logon Authentication Failed9c5dcd76-9f6d-42a3-b984-314b52678f20MimecastAuditAPI9c5dcd76-9f6d-42a3-b984-314b52678f20
Cross-Cloud Password Spray detection1f40ed57-f54b-462f-906a-ac3a89cc90d4AWS
AzureActiveDirectory
BehaviorAnalytics
MicrosoftThreatProtection
1f40ed57-f54b-462f-906a-ac3a89cc90d4
Cross-Cloud Suspicious Compute resource creation in GCP5c847e47-0a07-4c01-ab99-5817ad6cb11eGCPAuditLogsDefinition
AWSS3
5c847e47-0a07-4c01-ab99-5817ad6cb11e
Cross-Cloud Suspicious user activity observed in GCP Envourment58e306fe-1c49-4b8f-9b0e-15f25e8f0cd7GCPAuditLogsDefinition
AzureActiveDirectoryIdentityProtection
MicrosoftThreatProtection
MicrosoftDefenderAdvancedThreatProtection
MicrosoftCloudAppSecurity
58e306fe-1c49-4b8f-9b0e-15f25e8f0cd7
Cross-Cloud Unauthorized Credential Access Detection From AWS RDS Login122fbc6a-57ab-4aa7-b9a9-51ac4970cac1AzureActiveDirectory
AWSS3
122fbc6a-57ab-4aa7-b9a9-51ac4970cac1
Successful AWS Console Login from IP Address Observed Conducting Password Spray188db479-d50a-4a9c-a041-644bae347d1fAWS
MicrosoftDefenderAdvancedThreatProtection
AzureActiveDirectoryIdentityProtection
BehaviorAnalytics
MicrosoftThreatProtection
188db479-d50a-4a9c-a041-644bae347d1f
Suspicious AWS console logins by credential access alertsb51fe620-62ad-4ed2-9d40-5c97c0a8231fOfficeATP
AWS
MicrosoftDefenderAdvancedThreatProtection
AzureActiveDirectoryIdentityProtection
BehaviorAnalytics
MicrosoftThreatProtection
b51fe620-62ad-4ed2-9d40-5c97c0a8231f
Unauthorized user access across AWS and Azure60f31001-018a-42bf-8045-a92e1f361b7bAzureActiveDirectory
AWSS3
60f31001-018a-42bf-8045-a92e1f361b7b
Remote Desktop Network Brute force (ASIM Network Session schema)b7dc801e-1e79-48bb-91e8-2229a8e6d40bb7dc801e-1e79-48bb-91e8-2229a8e6d40b
NordPass - User fails authentication27b261dc-68f3-489a-944f-bc252e0c1960NordPass27b261dc-68f3-489a-944f-bc252e0c1960
Failed Logins from Unknown or Invalid User884be6e7-e568-418e-9c12-89229865ffdeOktaSSO
OktaSSOv2
884be6e7-e568-418e-9c12-89229865ffde
MFA Fatigue (OKTA)c2697b81-7fe9-4f57-ba1d-de46c6f91f9cOktaSSO
OktaSSOv2
c2697b81-7fe9-4f57-ba1d-de46c6f91f9c
Potential Password Spray Attacke27dd7e5-4367-4c40-a2b7-fcd7e7a8a508OktaSSO
OktaSSOv2
e27dd7e5-4367-4c40-a2b7-fcd7e7a8a508
Palo Alto Prisma Cloud - Multiple failed logins for user4f688252-bf9b-4136-87bf-d540b5be1050PaloAltoPrismaCloud4f688252-bf9b-4136-87bf-d540b5be1050
Ping Federate - Abnormal password reset attemptse45a7334-2cb4-4690-8156-f02cac73d584CefAmae45a7334-2cb4-4690-8156-f02cac73d584
PulseConnectSecure - Potential Brute Force Attempts34663177-8abf-4db1-b0a4-5683ab273f44SyslogAma34663177-8abf-4db1-b0a4-5683ab273f44
PulseConnectSecure - Large Number of Distinct Failed User Logins1fa1528e-f746-4794-8a41-14827f4cb798SyslogAma1fa1528e-f746-4794-8a41-14827f4cb798
Pure Failed Logined32b115-5001-43a7-a2bb-f53026db4d97ed32b115-5001-43a7-a2bb-f53026db4d97
Red Canary Threat Detection6d263abb-6445-45cc-93e9-c593d3d77b89RedCanaryDataConnector6d263abb-6445-45cc-93e9-c593d3d77b89
RSA ID Plus - Locked Administrator Account Detected488c759d-a82e-44cd-91bb-d766573918d7RSAIDPlus_AdminLogs_Connector488c759d-a82e-44cd-91bb-d766573918d7
Brute force attack against user credentials5a6ce089-e756-40fb-b022-c8e8864a973aSalesforceServiceCloudCCPDefinition5a6ce089-e756-40fb-b022-c8e8864a973a
Potential Password Spray Attack64d16e62-1a17-4a35-9ea7-2b9fe6f07118SalesforceServiceCloudCCPDefinition64d16e62-1a17-4a35-9ea7-2b9fe6f07118
Samsung Knox - Password Lockout Eventsfbff0a97-1972-4df8-a78c-254ccb9879efSamsungDCDefinitionfbff0a97-1972-4df8-a78c-254ccb9879ef
BTP - Trust and authorization Identity Provider monitor62357c23-ecdc-4edc-9349-8338063af1efSAPBTPAuditEvents62357c23-ecdc-4edc-9349-8338063af1ef
Possible AiTM Phishing Attempt Against Microsoft Entra ID16daa67c-b137-48dc-8eb7-76598a44791aAzureActiveDirectory
Zscaler
16daa67c-b137-48dc-8eb7-76598a44791a
Semperis DSP Failed Logons0e105444-fe13-4ce6-9239-21880076a3f9SemperisDSP0e105444-fe13-4ce6-9239-21880076a3f9
Semperis DSP Operations Critical Notifications8f471e21-3bb2-466f-9bc2-0a0326a60788SemperisDSP8f471e21-3bb2-466f-9bc2-0a0326a60788
Semperis DSP Kerberos krbtgt account with old password9ff3b26b-7636-412e-ac46-072b084b94cbSemperisDSP9ff3b26b-7636-412e-ac46-072b084b94cb
Azure secure score block legacy authenticationC27BB559-28C5-4924-A7DA-3BF04CD02C8FSenservaProC27BB559-28C5-4924-A7DA-3BF04CD02C8F
Azure secure score MFA registration V28EB2B20A-BF64-4DCC-9D98-1AD559502C00SenservaPro8EB2B20A-BF64-4DCC-9D98-1AD559502C00
Azure secure score PW age policy new88C9A5E0-31EC-490B-82E5-A286D9B99A67SenservaPro88C9A5E0-31EC-490B-82E5-A286D9B99A67
Sentinel One - User viewed agent’s passphrase51999097-60f4-42c0-bee8-fa28160e5583SentinelOne51999097-60f4-42c0-bee8-fa28160e5583
Silverfort - UserBruteForce Incident46ff357b-9e98-465b-9e45-cd52fa4a7522SilverfortAma46ff357b-9e98-465b-9e45-cd52fa4a7522
SlackAudit - Multiple failed logins for user93a91c37-032c-4380-847c-957c001957adSlackAuditAPI93a91c37-032c-4380-847c-957c001957ad
SonicWall - Allowed SSH, Telnet, and RDP Connections27f1a570-5f20-496b-88f6-a9aa2c5c9534CEF
SonicWallFirewall
CefAma
27f1a570-5f20-496b-88f6-a9aa2c5c9534
New Sonrai Ticketbcc3362d-b6f9-4de0-b41c-707fafd5a416SonraiDataConnectorbcc3362d-b6f9-4de0-b41c-707fafd5a416
Sonrai Ticket Assigned37a8d052-a3db-4dc6-9dca-9390cac6f486SonraiDataConnector37a8d052-a3db-4dc6-9dca-9390cac6f486
Sonrai Ticket Closedf5d467de-b5a2-4b4f-96db-55e27c733594SonraiDataConnectorf5d467de-b5a2-4b4f-96db-55e27c733594
Sonrai Ticket Escalation Executed0d29c93e-b83f-4dfb-bbbb-76824b77eecaSonraiDataConnector0d29c93e-b83f-4dfb-bbbb-76824b77eeca
Sonrai Ticket Escalation Executed822fff15-ea68-4d0f-94ee-b4482ddb6f3aSonraiDataConnector822fff15-ea68-4d0f-94ee-b4482ddb6f3a
Sonrai Ticket Reopenedb60129ab-ce22-4b76-858d-3204932a13ccSonraiDataConnectorb60129ab-ce22-4b76-858d-3204932a13cc
Sonrai Ticket Risk Accepted080191e8-271d-4ae6-85ce-c7bcd4b06b40SonraiDataConnector080191e8-271d-4ae6-85ce-c7bcd4b06b40
Sonrai Ticket Snoozed10e6c454-5cad-4f86-81ce-800235cb050aSonraiDataConnector10e6c454-5cad-4f86-81ce-800235cb050a
Sonrai Ticket Updatedaf9b8eb1-a8ef-40aa-92a4-1fc73a1479c7SonraiDataConnectoraf9b8eb1-a8ef-40aa-92a4-1fc73a1479c7
SpyCloud Enterprise Breach Detectioncb410ad5-6e9d-4278-b963-1e3af205d680cb410ad5-6e9d-4278-b963-1e3af205d680
SpyCloud Enterprise Malware Detection7ba50f9e-2f94-462b-a54b-8642b8c041f57ba50f9e-2f94-462b-a54b-8642b8c041f5
ClientDeniedAccessa9956d3a-07a9-44a6-a279-081a85020caeSyslogAmaa9956d3a-07a9-44a6-a279-081a85020cae
Excessive Failed Authentication from Invalid Inputsc775a46b-21b1-46d7-afa6-37e3e577a27bSyslogAmac775a46b-21b1-46d7-afa6-37e3e577a27b
Failed logon attempts in authprive7ec9fa6-e7f7-41ed-a34b-b956837a3ee6Syslog
SyslogAma
e7ec9fa6-e7f7-41ed-a34b-b956837a3ee6
SSH - Potential Brute Forcee1ce0eab-10d1-4aae-863f-9a383345ba88Syslog
SyslogAma
e1ce0eab-10d1-4aae-863f-9a383345ba88
TIE Active Directory attacks pathwaysde549a62-f595-4810-88bd-621338186588TenableIEde549a62-f595-4810-88bd-621338186588
TIE DCSync19d1f964-ddcf-437b-92ce-b9c1c14d24f1TenableIE19d1f964-ddcf-437b-92ce-b9c1c14d24f1
TIE Golden Ticket216e12dd-165a-4537-b241-32e1bd3330c7TenableIE216e12dd-165a-4537-b241-32e1bd3330c7
TIE Indicators of Attack6c75f0d2-2973-4188-bb05-ec7bc8696120TenableIE6c75f0d2-2973-4188-bb05-ec7bc8696120
TIE Indicators of Exposuresf6ae2eb2-97c9-4e0f-ae73-7420ef80d99dTenableIEf6ae2eb2-97c9-4e0f-ae73-7420ef80d99d
TIE LSASS Memory7851f57c-98b6-43c6-9747-9bb7cf11f21cTenableIE7851f57c-98b6-43c6-9747-9bb7cf11f21c
TIE Password Guessingd1416c25-5a56-4a88-8d7c-568e6551a307TenableIEd1416c25-5a56-4a88-8d7c-568e6551a307
TIE Password issues87af910a-e9c0-4c96-8045-f778ba405251TenableIE87af910a-e9c0-4c96-8045-f778ba405251
TIE Password Sprayingf47eb8cb-4acb-4ee4-887d-0247c6d73a72TenableIEf47eb8cb-4acb-4ee4-887d-0247c6d73a72
TIE privileged accounts issues5c170c73-75ba-48ea-8dfc-e4e2d4f23979TenableIE5c170c73-75ba-48ea-8dfc-e4e2d4f23979
TIE user accounts issuesc4562ef3-d821-4089-b6c0-120d95c855e6TenableIEc4562ef3-d821-4089-b6c0-120d95c855e6
Tenable.ad Active Directory attacks pathways4639bb0a-ca12-4a57-8e53-f61c2c6034d6Tenable.ad4639bb0a-ca12-4a57-8e53-f61c2c6034d6
Tenable.ad DCSync0c8d4de3-adb9-4161-a863-aa1e2c8bd959Tenable.ad0c8d4de3-adb9-4161-a863-aa1e2c8bd959
Tenable.ad Golden Ticketd1abda25-f88a-429a-8163-582533cd0defTenable.add1abda25-f88a-429a-8163-582533cd0def
Tenable.ad Indicators of Attack6405329a-8d20-48f3-aabc-e1b8a745568eTenable.ad6405329a-8d20-48f3-aabc-e1b8a745568e
Tenable.ad Indicators of Exposures55de1072-e93f-40f9-a14d-f7356d217cf6Tenable.ad55de1072-e93f-40f9-a14d-f7356d217cf6
Tenable.ad LSASS Memory6f7fa5f9-7d21-42c1-bc52-ac355b87c6cfTenable.ad6f7fa5f9-7d21-42c1-bc52-ac355b87c6cf
Tenable.ad Password Guessing44d74560-0cd1-4e73-a8f5-d16eeeba219eTenable.ad44d74560-0cd1-4e73-a8f5-d16eeeba219e
Tenable.ad Password issues2518b57f-1a8b-44ea-935d-7dc1cfe4f918Tenable.ad2518b57f-1a8b-44ea-935d-7dc1cfe4f918
Tenable.ad Password Spraying29d350db-0ac0-4f4c-92ff-dac0f6335612Tenable.ad29d350db-0ac0-4f4c-92ff-dac0f6335612
Tenable.ad privileged accounts issues353d6474-d795-4086-a179-ba1db4d8bbcbTenable.ad353d6474-d795-4086-a179-ba1db4d8bbcb
Tenable.ad user accounts issues4f8ed6f3-8815-437d-9462-f0def9dc70d6Tenable.ad4f8ed6f3-8815-437d-9462-f0def9dc70d6
Theom Critical Risksbb9051ef-0e72-4758-a143-80c25ee452f0Theombb9051ef-0e72-4758-a143-80c25ee452f0
Theom High Risks74b80987-0a62-448c-8779-47b02e17d3cfTheom74b80987-0a62-448c-8779-47b02e17d3cf
Theom Insightsd200da84-0191-44ce-ad9e-b85e64c84c89Theomd200da84-0191-44ce-ad9e-b85e64c84c89
Theom Low Riskscf7fb616-ac80-40ce-ad18-aa18912811f8Theomcf7fb616-ac80-40ce-ad18-aa18912811f8
Theom Medium Risks4cb34832-f73a-49f2-8d38-c2d135c5440bTheom4cb34832-f73a-49f2-8d38-c2d135c5440b
Theom - Dev secrets unencryptedf2490f5b-269c-471d-9ff4-475f62ea498eTheomf2490f5b-269c-471d-9ff4-475f62ea498e
Vectra AI Detect - Suspected Compromised Account321f9dbd-64b7-4541-81dc-08cf7732ccb0CefAma321f9dbd-64b7-4541-81dc-08cf7732ccb0
Vectra Account’s Behaviorsce54b5d3-4c31-4eaf-a73e-31412270b6abCefAmace54b5d3-4c31-4eaf-a73e-31412270b6ab
Vectra AI Detect - Detections with High Severity39e48890-2c02-487e-aa9e-3ba494061798CefAma39e48890-2c02-487e-aa9e-3ba494061798
Vectra AI Detect - Suspected Compromised Host60eb6cf0-3fa1-44c1-b1fe-220fbee23d63CefAma60eb6cf0-3fa1-44c1-b1fe-220fbee23d63
Vectra Host’s Behaviors33e3b6da-2660-4cd7-9032-11be76db88d2CefAma33e3b6da-2660-4cd7-9032-11be76db88d2
Vectra AI Detect - Suspicious Behaviors by Category6cb75f65-231f-46c4-a0b3-50ff21ee6ed3CefAma6cb75f65-231f-46c4-a0b3-50ff21ee6ed3
Alarming number of anomalies generated in NetBackup2e0efcd4-56d2-41df-9098-d6898a58c62b2e0efcd4-56d2-41df-9098-d6898a58c62b
Multiple failed attempts of NetBackup logind39f0c47-2e85-49b9-a686-388c2eb7062cd39f0c47-2e85-49b9-a686-388c2eb7062c
VMware ESXi - Multiple Failed Shell Login via SSH22d177d5-588c-4f1a-a332-2695f52079bbSyslogAma22d177d5-588c-4f1a-a332-2695f52079bb
Identify instances where a single source is observed using multiple user agents (ASIM Web Session)813ccf3b-0321-4622-b0bc-63518fd14454813ccf3b-0321-4622-b0bc-63518fd14454
Detect potential file enumeration activity (ASIM Web Session)b3731ce1-1f04-47c4-95c2-9827408c4375b3731ce1-1f04-47c4-95c2-9827408c4375
Excessive Windows Logon Failures2391ce61-8c8d-41ac-9723-d945b2e90720SecurityEvents
WindowsSecurityEvents
2391ce61-8c8d-41ac-9723-d945b2e90720
SecurityEvent - Multiple authentication failures followed by a successcf3ede88-a429-493b-9108-3e46d3c741f7SecurityEvents
WindowsSecurityEvents
cf3ede88-a429-493b-9108-3e46d3c741f7
Non Domain Controller Active Directory Replicationb9d2eebc-5dcb-4888-8165-900db44443abSecurityEvents
WindowsSecurityEvents
b9d2eebc-5dcb-4888-8165-900db44443ab
Zero Networks Segment - New API Token created603a6b18-b54a-43b7-bb61-d2b0b47d224aZeroNetworksSegmentAuditFunction
ZeroNetworksSegmentAuditNativePoller
603a6b18-b54a-43b7-bb61-d2b0b47d224a
Brute force attack against user credentials (Uses Authentication Normalization)a6c435a2-b1a0-466d-b730-9f8af69262e8a6c435a2-b1a0-466d-b730-9f8af69262e8
Potential Password Spray Attack (Uses Authentication Normalization)6a2e2ff4-5568-475e-bef2-b95f12b9367b6a2e2ff4-5568-475e-bef2-b95f12b9367b
Dev-0228 File Path Hashes November 2021 (ASIM Version)29a29e5d-354e-4f5e-8321-8b39d25047bf29a29e5d-354e-4f5e-8321-8b39d25047bf
Excessive number of HTTP authentication failures from a source (ASIM Web Session schema)a1bddaf8-982b-4089-ba9e-6590dfcf80eaSquidProxy
Zscaler
a1bddaf8-982b-4089-ba9e-6590dfcf80ea
Wazuh - Large Number of Web errors from an IP2790795b-7dba-483e-853f-44aa0bc9c9852790795b-7dba-483e-853f-44aa0bc9c985
Trust Monitor Event8dcf7238-a7d0-4cfd-8d0c-b230e3cd91828dcf7238-a7d0-4cfd-8d0c-b230e3cd9182
IP with multiple failed Microsoft Entra ID logins successfully logs in to Palo Alto VPNba144bf8-75b8-406f-9420-ed74397f9479AzureActiveDirectory
PaloAltoNetworks
ba144bf8-75b8-406f-9420-ed74397f9479
Failed AzureAD logons but success logon to AWS Console643c2025-9604-47c5-833f-7b4b9378a1f5AzureActiveDirectory
AWS
643c2025-9604-47c5-833f-7b4b9378a1f5
Failed AzureAD logons but success logon to host8ee967a2-a645-4832-85f4-72b635bcb3a6AzureActiveDirectory
SecurityEvents
Syslog
WindowsSecurityEvents
WindowsForwardedEvents
8ee967a2-a645-4832-85f4-72b635bcb3a6
Failed AWS Console logons but success logon to AzureAD910124df-913c-47e3-a7cd-29e1643fa55eAzureActiveDirectory
AWS
910124df-913c-47e3-a7cd-29e1643fa55e
Dev-0228 File Path Hashes November 20213b443f22-9be9-4c35-ac70-a94757748439MicrosoftDefenderAdvancedThreatProtection
MicrosoftThreatProtection
3b443f22-9be9-4c35-ac70-a94757748439
Europium - Hash and IP IOCs - September 20229d8b5a18-b7db-4c23-84a6-95febaf7e1e4DNS
AzureMonitor(VMInsights)
F5
CiscoASA
PaloAltoNetworks
Fortinet
CheckPoint
CEF
MicrosoftThreatProtection
Office365
AzureFirewall
WindowsFirewall
9d8b5a18-b7db-4c23-84a6-95febaf7e1e4
Failed host logons but success logon to AzureAD1ce5e766-26ab-4616-b7c8-3b33ae321e80AzureActiveDirectory
SecurityEvents
Syslog
WindowsSecurityEvents
WindowsForwardedEvents
1ce5e766-26ab-4616-b7c8-3b33ae321e80
Multiple Password Reset by user0b9ae89d-8cad-461c-808f-0494f70ad5c4AzureActiveDirectory
SecurityEvents
Syslog
Office365
WindowsSecurityEvents
WindowsForwardedEvents
0b9ae89d-8cad-461c-808f-0494f70ad5c4
Azure VM Run Command operation executed during suspicious login window11bda520-a965-4654-9a45-d09f372f71aaAzureActivity
BehaviorAnalytics
11bda520-a965-4654-9a45-d09f372f71aa
AD FS Abnormal EKU object identifier attributecfc1ae62-db63-4a3e-b88b-dc04030c2257SecurityEventscfc1ae62-db63-4a3e-b88b-dc04030c2257
Failed logon attempts by valid accounts within 10 mins0777f138-e5d8-4eab-bec1-e11ddfbc2be2SecurityEvents
WindowsSecurityEvents
WindowsForwardedEvents
0777f138-e5d8-4eab-bec1-e11ddfbc2be2
Potential Kerberoasting1572e66b-20a7-4012-9ec4-77ec4b101bc8SecurityEvents
WindowsSecurityEvents
WindowsForwardedEvents
1572e66b-20a7-4012-9ec4-77ec4b101bc8
New country signIn with correct password7808c05a-3afd-4d13-998a-a59e2297693fAzureActiveDirectory7808c05a-3afd-4d13-998a-a59e2297693f
High count of failed attempts from same client IP19e01883-15d8-4eb6-a7a5-3276cd668388AzureMonitor(IIS)19e01883-15d8-4eb6-a7a5-3276cd668388
High count of failed logons by a user884c4957-70ea-4f57-80b9-1bca3890315bAzureMonitor(IIS)884c4957-70ea-4f57-80b9-1bca3890315b
Zoom E2E Encryption Disablede4779bdc-397a-4b71-be28-59e6a1e1d16be4779bdc-397a-4b71-be28-59e6a1e1d16b
External User Access Enabled8e267e91-6bda-4b3c-bf68-9f5cbdd103a38e267e91-6bda-4b3c-bf68-9f5cbdd103a3