Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

API - JWT validation

Back Id bbd163f4-1f56-434f-9c23-b06713c119c2 Rulename API - JWT validation Description 42Crunch API protection against JWT validation Severity Low Tactics InitialAccess CredentialAccess Techniques T1190 T1528 Required data connectors 42CrunchAPIProtection Kind Scheduled Query frequency 5m Query period 5m Trigger threshold 0 Trigger operator gt Source Uri https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/42Crunch API Protection/Analytic Rules/APIJWTValidation.yaml Version 1.0.1 Arm template bbd163f4-1f56-434f-9c23-b06713c119c2.json KQL apifirewall_log_1_CL | where TimeGenerated >= ago(5m) | where Error_Message_s has "missing [\"x-access-token\"]" | project-away Non_blocking_mode_b, Source_Port_d, Destination_Port_d, Query_s, API_ID_g, Response_Header_s, Request_Header_s, Errors_s, Type, UUID_g | sort by TimeGenerated desc YAML id: bbd163f4-1f56-434f-9c23-b06713c119c2 description: | '42Crunch API protection against JWT validation' entityMappings: - entityType: IP fieldMappings: - columnName: Source_IP_s identifier: Address - entityType: Host fieldMappings: - columnName: Hostname_s identifier: HostName - entityType: Account fieldMappings: - columnName: Instance_Name_s identifier: FullName name: API - JWT validation queryPeriod: 5m relevantTechniques: - T1190 - T1528 OriginalUri: https://github.
Read full post gdoc_arrow_right_alt

Azure DevOps PAT used with Browser

Back Id 5f0d80db-3415-4265-9d52-8466b7372e3a Rulename Azure DevOps PAT used with Browser Description Personal Access Tokens (PATs) are used as an alternate password to authenticate into Azure DevOps. PATs are intended for programmatic access use in code or applications. This can be prone to attacker theft if not adequately secured. This query looks for the use of a PAT in authentication but from a User Agent indicating a browser. This should not be normal activity and could be an indicator of an attacker using a stolen PAT.
Read full post gdoc_arrow_right_alt

Dataverse - Anomalous application user activity

Back Id 0820da12-e895-417f-9175-7c256fcfb33e Rulename Dataverse - Anomalous application user activity Description Identifies anomalies in activity patterns of Dataverse application (non-interactive) users, based on activity falling outside the normal pattern of use. Severity Medium Tactics CredentialAccess Execution Persistence Techniques T1528 T1569 T0871 T0834 T0859 Required data connectors Dataverse Kind Scheduled Query frequency 5h Query period 14d Trigger threshold 0 Trigger operator gt Source Uri https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Business Applications/Analytic Rules/Dataverse - Anomalous application user activity.
Read full post gdoc_arrow_right_alt

Expired access credentials being used in Azure

Back Id 433c3b0a-7278-4d74-b137-963ac6f9a7e7 Rulename Expired access credentials being used in Azure Description This query searches for logins with an expired access credential (for example an expired cookie). It then matches the IP address from which the expired credential access occurred with the IP addresses of successful logins. If there are logins with expired credentials, but no successful logins from an IP, this might indicate an attacker has copied the authentication cookie and is re-using it on another machine.
Read full post gdoc_arrow_right_alt

Identify instances where a single source is observed using multiple user agents ASIM Web Session

Back Id 813ccf3b-0321-4622-b0bc-63518fd14454 Rulename Identify instances where a single source is observed using multiple user agents (ASIM Web Session) Description This detection mechanism identifies requests originating from a single source within a brief time period that exhibit multiple user agents. Such behavior could indicate unusual web browsing activities performed by unconventional processes Severity Medium Tactics InitialAccess CredentialAccess Techniques T1190 T1133 T1528 Kind Scheduled Query frequency 1h Query period 1h Trigger threshold 0 Trigger operator gt Source Uri https://github.
Read full post gdoc_arrow_right_alt

Microsoft Entra ID Hybrid Health AD FS Suspicious Application

Back Id d9938c3b-16f9-444d-bc22-ea9a9110e0fd Rulename Microsoft Entra ID Hybrid Health AD FS Suspicious Application Description This detection uses AzureActivity logs (Administrative category) to identify a suspicious application adding a server instance to an Microsoft Entra ID Hybrid Health AD FS service or deleting the AD FS service instance. Usually the Microsoft Entra ID Connect Health Agent application with ID cf6d7e68-f018-4e0a-a7b3-126e053fb88d and ID cb1056e2-e479-49de-ae31-7812af012ed8 is used to perform those operations. Severity Medium Tactics CredentialAccess
Read full post gdoc_arrow_right_alt

Suspicious application consent for offline access

Back Id 3533f74c-9207-4047-96e2-0eb9383be587 Rulename Suspicious application consent for offline access Description This will alert when a user consents to provide a previously-unknown Azure application with offline access via OAuth. Offline access will provide the Azure App with access to the listed resources without requiring two-factor authentication. Consent to applications with offline access and read capabilities should be rare, especially as the knownApplications list is expanded. Public contributions to expand this filter are welcome!
Read full post gdoc_arrow_right_alt

Suspicious application consent similar to O365 Attack Toolkit

Back Id f948a32f-226c-4116-bddd-d95e91d97eb9 Rulename Suspicious application consent similar to O365 Attack Toolkit Description This will alert when a user consents to provide a previously-unknown Azure application with the same OAuth permissions used by the MDSec O365 Attack Toolkit (https://github.com/mdsecactivebreach/o365-attack-toolkit). The default permissions/scope for the MDSec O365 Attack toolkit change sometimes but often include contacts.read, user.read, mail.read, notes.read.all, mailboxsettings.readwrite, files.readwrite.all, mail.send, files.read, and files.read.all. Consent to applications with these permissions should be rare, especially as the knownApplications list is expanded, especially as the knownApplications list is expanded.
Read full post gdoc_arrow_right_alt

Suspicious application consent similar to PwnAuth

Back Id 39198934-62a0-4781-8416-a81265c03fd6 Rulename Suspicious application consent similar to PwnAuth Description This will alert when a user consents to provide a previously-unknown Azure application with the same OAuth permissions used by the FireEye PwnAuth toolkit (https://github.com/fireeye/PwnAuth). The default permissions/scope for the PwnAuth toolkit are user.read, offline_access, mail.readwrite, mail.send, and files.read.all. Consent to applications with these permissions should be rare, especially as the knownApplications list is expanded. Public contributions to expand this filter are welcome!
Read full post gdoc_arrow_right_alt

Suspicious Entra ID Joined Device Update

Back Id 3a3c6835-0086-40ca-b033-a93bf26d878f Rulename Suspicious Entra ID Joined Device Update Description This query looks for suspicious updates to an Microsoft Entra ID joined device where the device name is changed and the device falls out of compliance. This could occur when a threat actor updates the details of an Autopilot provisioned device using a stolen device ticket, in order to access certificates and keys. Ref: https://dirkjanm.io/assets/raw/Insomnihack%20Breaking%20and%20fixing%20Azure%20AD%20device%20identity%20security.pdf Severity Medium Tactics CredentialAccess Techniques T1528 Required data connectors AzureActiveDirectory Kind Scheduled Query frequency 1d Query period 1d Trigger threshold 0 Trigger operator gt Source Uri https://github.
Read full post gdoc_arrow_right_alt