Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
22 commits
Select commit Hold shift + click to select a range
ea5afde
Update AWS_IAM_PrivilegeEscalationbyAttachment.yaml
v-sabiraj Jan 8, 2026
3b35116
Remove external Medium links from AWS analytic rules
v-sabiraj Jan 8, 2026
863b920
Bump version numbers in AWS analytic rule YAMLs
v-sabiraj Jan 8, 2026
da2e94e
Update PaloAlto-NetworkBeaconing.yaml
v-sabiraj Jan 8, 2026
528f130
Update MFAFatigue.yaml
v-sabiraj Jan 8, 2026
d5ce43d
Update AdminSDHolder_Modifications.yaml
v-sabiraj Jan 8, 2026
cb91570
Update ExcessiveNetworkFailuresFromSource.yaml
v-sabiraj Jan 9, 2026
f579778
Update UseragentExploitPentest.yaml
v-sabiraj Jan 9, 2026
18aec55
Update threat intelligence and documentation links
v-sabiraj Jan 9, 2026
b840dce
Update Wazuh-Large_Number_of_Web_errors_from_an_IP.yaml
v-sabiraj Jan 9, 2026
1c0298c
Update RiskIQ playbooks to remove outdated account settings link
v-sabiraj Jan 9, 2026
f9b897c
Update ExchangeCompromiseHunting.json
v-sabiraj Jan 12, 2026
d387204
Update GainCodeExecutionADFSviaWMI.yaml
v-sabiraj Jan 12, 2026
9828a9b
Update AWS solution to version 3.0.8 and improve descriptions
v-sabiraj Jan 12, 2026
6edb881
Update Network Threat Protection Essentials to v3.0.2
v-sabiraj Jan 12, 2026
54c6cc2
Bump Okta SSO solution to version 3.1.4
v-sabiraj Jan 12, 2026
2a0819e
Update PaloAlto-PAN-OS to 3.0.11 and Okta SSO rule
v-sabiraj Jan 12, 2026
4cdd69f
Release RiskIQ Solution v3.0.0 with ARM template updates
v-sabiraj Jan 13, 2026
6fe1479
Update CMMC 2.0 solution to version 3.1.1
v-sabiraj Jan 13, 2026
c1f3ec3
Update release notes with non-functional link changes
v-sabiraj Jan 13, 2026
255f7f1
Merge branch 'master' into v-sabiraj-updatingbrokenlinks
v-sabiraj Jan 13, 2026
1bfec89
Update CMMC 2.0 package and refine template mappings
v-sabiraj Jan 13, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ id: a1bddaf8-982b-4089-ba9e-6590dfcf80ea
name: Excessive number of HTTP authentication failures from a source (ASIM Web Session schema)
description: |
This rule identifies a source that repeatedly fails to authenticate to a web service (HTTP response code 403). This may indicate a [brute force](https://en.wikipedia.org/wiki/Brute-force_attack) or [credential stuffing](https://en.wikipedia.org/wiki/Credential_stuffing) attack.
This rule uses the [Advanced Security Information Model (ASIM)](https://aka.ms/AboutSIM) and supports any web session source that complies with ASIM.
This rule uses the [Advanced Security Information Model (ASIM)](https://aka.ms/AboutASIM) and supports any web session source that complies with ASIM.
severity: Low
requiredDataConnectors:
- connectorId: SquidProxy
Expand Down Expand Up @@ -49,7 +49,7 @@ customDetails:
alertDetailsOverride:
alertDisplayNameFormat: Excessive number of HTTP authentication failures from {{SrcIpAddr}
alertDescriptionFormat: A client with address {{SrcIpAddr}} generated a large number of failed authentication HTTP requests. This may indicate a [brute force](https://en.wikipedia.org/wiki/Brute-force_attack) or [credential stuffing](https://en.wikipedia.org/wiki/Credential_stuffing) attack.
version: 1.0.5
version: 1.0.6
kind: Scheduled
metadata:
source:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
id: 2790795b-7dba-483e-853f-44aa0bc9c985
name: Wazuh - Large Number of Web errors from an IP
description: |
'Identifies instances where Wazuh logged over 400 '403' Web Errors from one IP Address. To onboard Wazuh data into Sentinel please view: https://github.com/wazuh/wazuh-documentation/blob/master/source/azure/monitoring%20activity.rst'
'Identifies instances where Wazuh logged over 400 '403' Web Errors from one IP Address. To onboard Wazuh data into Sentinel please view: https://documentation.wazuh.com/current/cloud-security/azure/index.html'
severity: Low
requiredDataConnectors: []
queryFrequency: 1d
Expand Down Expand Up @@ -31,7 +31,7 @@ entityMappings:
fieldMappings:
- identifier: Address
columnName: SourceIP
version: 1.0.4
version: 1.0.5
kind: Scheduled
metadata:
source:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ name: ADFS DKM Master Key Export
description: |
'Identifies an export of the ADFS DKM Master Key from Active Directory.
References: https://blogs.microsoft.com/on-the-issues/2020/12/13/customers-protect-nation-state-cyberattacks/,
https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html?1
https://cloud.google.com/blog/topics/threat-intelligence/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor
To understand further the details behind this detection, please review the details in the original PR and subequent PR update to this:
https://github.com/Azure/Azure-Sentinel/pull/1562#issue-551542469
https://github.com/Azure/Azure-Sentinel/pull/1512#issue-543053339
Expand Down Expand Up @@ -85,7 +85,7 @@ entityMappings:
fieldMappings:
- identifier: ResourceId
columnName: _ResourceId
version: 1.2.1
version: 1.2.2
kind: Scheduled
metadata:
source:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@ description: |
Failed to resolve scalar expression named "[@Name]"
For more on how WMI was used in Solorigate see https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/.
The query contains some features from the following detections to look for potentially malicious ADFS activity. See them for more details.
- ADFS Key Export (Sysmon): https://github.com/Azure/Azure-Sentinel/blob/master/Detections/SecurityEvent/ADFSKeyExportSysmon.yaml
- ADFS DKM Master Key Export: https://github.com/Azure/Azure-Sentinel/blob/master/Detections/MultipleDataSources/ADFS-DKM-MasterKey-Export.yaml'
severity: Medium
requiredDataConnectors:
Expand Down Expand Up @@ -158,7 +157,7 @@ entityMappings:
columnName: HostName
- identifier: NTDomain
columnName: HostNameDomain
version: 1.1.3
version: 1.1.4
kind: Scheduled
metadata:
source:
Expand Down
4 changes: 2 additions & 2 deletions Detections/SecurityEvent/AdminSDHolder_Modifications.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: |
'This query detects modification in the AdminSDHolder in the Active Directory which could indicate an attempt for persistence.
AdminSDHolder Modification is a persistence technique in which an attacker abuses the SDProp process in Active Directory to establish a persistent backdoor to Active Directory.
This query searches for the event id 5136 where the Object DN is AdminSDHolder.
Ref: https://attack.stealthbits.com/adminsdholder-modification-ad-persistence'
Ref: https://netwrix.com/en/cybersecurity-glossary/cyber-security-attacks/adminsdholder-attack/'
severity: High
requiredDataConnectors:
- connectorId: SecurityEvents
Expand Down Expand Up @@ -43,7 +43,7 @@ entityMappings:
columnName: HostName
- identifier: DnsDomain
columnName: HostNameDomain
version: 1.0.4
version: 1.0.5
kind: Scheduled
metadata:
source:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: |
'This query looks for messages related to file downloads of suspicious file types on an Exchange Server. This could indicate attempted deployment of webshells.
This query uses the Exchange HttpProxy AOBGeneratorLog, you will need to onboard this log as a custom log under the table http_proxy_oab_CL before using this query.
This log is commonly found at C:\Program Files\Microsoft\Exchange Server\V15\Logging\OABGeneratorLog on the Exchange server. Details on collecting custom logs into Sentinel
can be found here: https://learn.microsoft.com/azure/sentinel/connect-custom-logs
can be found here: https://learn.microsoft.com/en-us/azure/sentinel/connect-custom-logs-ama
severity: Medium
requiredDataConnectors: []
queryFrequency: 1d
Expand Down Expand Up @@ -35,7 +35,7 @@ entityMappings:
columnName: HostName
- identifier: DnsDomain
columnName: HostNameDomain
version: 1.0.2
version: 1.0.3
kind: Scheduled
metadata:
source:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,7 @@ description: |
'Amazon Relational Database Service (RDS) is scalable relational database in the cloud.
If your organization have one or more AWS RDS Databases running, monitoring changes to especially internet facing AWS RDS (Relational Database Service)
Once alerts triggered, validate if changes observed are authorized and adhere to change control policy.
More information: https://medium.com/@GorillaStack/the-most-important-aws-cloudtrail-security-events-to-track-a5b9873f8255
and RDS API Reference Docs: https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_Operations.html'
RDS API Reference Docs: https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_Operations.html'
severity: Low
status: Available
requiredDataConnectors:
Expand Down Expand Up @@ -47,5 +46,5 @@ entityMappings:
fieldMappings:
- identifier: Address
columnName: SourceIpAddress
version: 1.0.3
version: 1.0.4
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,8 @@ id: 65360bb0-8986-4ade-a89d-af3cf44d28aa
name: Changes to Amazon VPC settings
description: |
'Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define.
This identifies changes to Amazon VPC (Virtual Private Cloud) settings such as new ACL entries,routes, routetable or Gateways.
More information: https://medium.com/@GorillaStack/the-most-important-aws-cloudtrail-security-events-to-track-a5b9873f8255
and AWS VPC API Docs: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/OperationList-query-vpc.html'
This identifies changes to Amazon VPC (Virtual Private Cloud) settings such as new ACL entries,routes, routetable or Gateways.
AWS VPC API Docs: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/OperationList-query-vpc.html'
severity: Low
status : Available
requiredDataConnectors:
Expand Down Expand Up @@ -50,5 +49,5 @@ entityMappings:
fieldMappings:
- identifier: Address
columnName: SourceIpAddress
version: 1.0.6
version: 1.0.7
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,7 @@ id: 4f19d4e3-ec5f-4abc-9e61-819eb131758c
name: Changes to AWS Security Group ingress and egress settings
description: |
'A Security Group acts as a virtual firewall of an instance to control inbound and outbound traffic.
Hence, ingress and egress settings changes to AWS Security Group should be monitored as these can expose the enviornment to new attack vectors.
More information: https://medium.com/@GorillaStack/the-most-important-aws-cloudtrail-security-events-to-track-a5b9873f8255. '
Hence, ingress and egress settings changes to AWS Security Group should be monitored as these can expose the enviornment to new attack vectors. '
severity: Low
status: Available
requiredDataConnectors:
Expand Down Expand Up @@ -47,5 +46,5 @@ entityMappings:
fieldMappings:
- identifier: Address
columnName: SourceIpAddress
version: 1.0.3
version: 1.0.4
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,7 @@ name: Changes to AWS Elastic Load Balancer security groups
description: |
'Elastic Load Balancer distributes incoming traffic across multiple instances in multiple availability Zones. This increases the fault tolerance of your applications.
Unwanted changes to Elastic Load Balancer specific security groups could open your environment to attack and hence needs monitoring.
More information: https://medium.com/@GorillaStack/the-most-important-aws-cloudtrail-security-events-to-track-a5b9873f8255
and https://aws.amazon.com/elasticloadbalancing/. '
More information: https://aws.amazon.com/elasticloadbalancing/. '
severity: Low
status: Available
requiredDataConnectors:
Expand Down Expand Up @@ -48,5 +47,5 @@ entityMappings:
fieldMappings:
- identifier: Address
columnName: SourceIpAddress
version: 1.0.3
version: 1.0.4
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ description: |
Identifies when existing role is removed and new/existing high privileged role is added to instance profile.
Any instance with this instance profile attached is able to perform privileged operations.
AWS Instance Profile: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
and CloudGoat - IAM PrivilegeEscalation by Attachment: https://github.com/RhinoSecurityLabs/cloudgoat/tree/master/scenarios/iam_privesc_by_attachment '
and CloudGoat - IAM PrivilegeEscalation by Attachment: https://github.com/RhinoSecurityLabs/cloudgoat/tree/master/cloudgoat/scenarios/aws/iam_privesc_by_attachment '
requiredDataConnectors:
- connectorId: AWS
dataTypes:
Expand Down
Binary file added Solutions/Amazon Web Services/Package/3.0.8.zip
Binary file not shown.
12 changes: 6 additions & 6 deletions Solutions/Amazon Web Services/Package/createUiDefinition.json
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@
"name": "dataconnectors3-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "This Solution installs the data connector for Amazon Web Services. You can get Amazon Web Services data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view."
"text": "This Solution installs the data connector for Amazon Web Services S3 WAF. You can get Amazon Web Services S3 WAF data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view."
}
},
{
Expand Down Expand Up @@ -180,7 +180,7 @@
"name": "analytic1-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "Amazon Relational Database Service (RDS) is scalable relational database in the cloud.\nIf your organization have one or more AWS RDS Databases running, monitoring changes to especially internet facing AWS RDS (Relational Database Service)\nOnce alerts triggered, validate if changes observed are authorized and adhere to change control policy.\nMore information: https://medium.com/@GorillaStack/the-most-important-aws-cloudtrail-security-events-to-track-a5b9873f8255 \nand RDS API Reference Docs: https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_Operations.html"
"text": "Amazon Relational Database Service (RDS) is scalable relational database in the cloud.\nIf your organization have one or more AWS RDS Databases running, monitoring changes to especially internet facing AWS RDS (Relational Database Service)\nOnce alerts triggered, validate if changes observed are authorized and adhere to change control policy.\nRDS API Reference Docs: https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_Operations.html"
}
}
]
Expand All @@ -194,7 +194,7 @@
"name": "analytic2-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define.\nThis identifies changes to Amazon VPC (Virtual Private Cloud) settings such as new ACL entries,routes, routetable or Gateways.\nMore information: https://medium.com/@GorillaStack/the-most-important-aws-cloudtrail-security-events-to-track-a5b9873f8255 \nand AWS VPC API Docs: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/OperationList-query-vpc.html"
"text": "Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define.\nThis identifies changes to Amazon VPC (Virtual Private Cloud) settings such as new ACL entries,routes, routetable or Gateways. \nAWS VPC API Docs: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/OperationList-query-vpc.html"
}
}
]
Expand Down Expand Up @@ -278,7 +278,7 @@
"name": "analytic8-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "A Security Group acts as a virtual firewall of an instance to control inbound and outbound traffic.\n Hence, ingress and egress settings changes to AWS Security Group should be monitored as these can expose the enviornment to new attack vectors.\nMore information: https://medium.com/@GorillaStack/the-most-important-aws-cloudtrail-security-events-to-track-a5b9873f8255. "
"text": "A Security Group acts as a virtual firewall of an instance to control inbound and outbound traffic.\n Hence, ingress and egress settings changes to AWS Security Group should be monitored as these can expose the enviornment to new attack vectors. "
}
}
]
Expand All @@ -292,7 +292,7 @@
"name": "analytic9-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "Elastic Load Balancer distributes incoming traffic across multiple instances in multiple availability Zones. This increases the fault tolerance of your applications.\n Unwanted changes to Elastic Load Balancer specific security groups could open your environment to attack and hence needs monitoring.\n More information: https://medium.com/@GorillaStack/the-most-important-aws-cloudtrail-security-events-to-track-a5b9873f8255 \n and https://aws.amazon.com/elasticloadbalancing/. "
"text": "Elastic Load Balancer distributes incoming traffic across multiple instances in multiple availability Zones. This increases the fault tolerance of your applications.\n Unwanted changes to Elastic Load Balancer specific security groups could open your environment to attack and hence needs monitoring.\n More information: https://aws.amazon.com/elasticloadbalancing/. "
}
}
]
Expand Down Expand Up @@ -1086,7 +1086,7 @@
"name": "huntingquery2-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "An instance profile is a container for an IAM role that you can use to pass role information to an EC2 instance when the instance start.\nIdentifies when existing role is removed and new/existing high privileged role is added to instance profile. \nAny instance with this instance profile attached is able to perform privileged operations.\nAWS Instance Profile: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html \nand CloudGoat - IAM PrivilegeEscalation by Attachment: https://github.com/RhinoSecurityLabs/cloudgoat/tree/master/scenarios/iam_privesc_by_attachment This hunting query depends on AWS AWSS3 data connector (AWSCloudTrail AWSCloudTrail Parser or Table)"
"text": "An instance profile is a container for an IAM role that you can use to pass role information to an EC2 instance when the instance start.\nIdentifies when existing role is removed and new/existing high privileged role is added to instance profile. \nAny instance with this instance profile attached is able to perform privileged operations.\nAWS Instance Profile: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html \nand CloudGoat - IAM PrivilegeEscalation by Attachment: https://github.com/RhinoSecurityLabs/cloudgoat/tree/master/cloudgoat/scenarios/aws/iam_privesc_by_attachment This hunting query depends on AWS AWSS3 data connector (AWSCloudTrail AWSCloudTrail Parser or Table)"
}
}
]
Expand Down
Loading
Loading