-
Notifications
You must be signed in to change notification settings - Fork 540
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Rule Tuning] Adjusting Microsoft Entra ID Rare Authentication Requirement for Principal User
#4562
base: main
Are you sure you want to change the base?
[Rule Tuning] Adjusting Microsoft Entra ID Rare Authentication Requirement for Principal User
#4562
Conversation
Rule: Tuning - GuidelinesThese guidelines serve as a reminder set of considerations when tuning an existing rule. Documentation and Context
Rule Metadata Checks
Testing and Validation
|
@@ -172,7 +172,8 @@ | |||
}, | |||
"logs-azure.signinlogs-*": { | |||
"azure.signinlogs.properties.conditional_access_audiences.application_id": "keyword", | |||
"azure.signinlogs.properties.original_transfer_method": "keyword" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just checking for these do we know if they are present in the azure integration 1.0? Current backports for azure can use 1.0 through 1.22, just making sure we do not need to minstack the rule for the integration version. Thanks!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
But authentication_method
does not appear to be 👀 See PR. for more details.
Pull Request
Issue link(s):
Summary - What I changed
Tunes the
Microsoft Entra ID Rare Authentication Requirement for Principal User
rule for the following reasons...not azure.signinlogs.properties.device_detail.browser: *
- Before we were ignoring what was suspected to be browser activity, butazure.signinlogs.properties.device_detail.browser
is more accurate for determining if this were browser based or not without relying solely on user agentsazure.signinlogs.properties.authentication_details.authentication_method: "Password"
- The SFA attempts by the botnet were specifically via Password-only attempts. There were plenty of FPs generated from other methods such as OTPs, device-based, etc.How To Test
Checklist
bug
,enhancement
,schema
,maintenance
,Rule: New
,Rule: Deprecation
,Rule: Tuning
,Hunt: New
, orHunt: Tuning
so guidelines can be generatedmeta:rapid-merge
label if planning to merge within 24 hoursContributor checklist