You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/security-operations-consumer-accounts.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,7 @@ From the Azure portal, you can view Azure AD Audit logs and download as comma se
63
63
64
64
***Microsoft Sentinel** – security analytics with security information and event management (SIEM) capabilities
65
65
*[What is Microsoft Sentinel?](../../sentinel/overview.md)
66
-
***Sigma rules** - an open standard for writing rules and templates that automated management tools can use to parse log files. If there are Sigma templates for our recommended search criteria, we added a link to the Sigma repo. The Sigma templates aren't written, tested, or managed by Microsoft. The repo and templates are created, and collected, by the IT security community.
66
+
***Sigma rules** - an open standard for writing rules and templates that automated management tools can use to parse log files. If there are Sigma templates for our recommended search criteria, we added a link to the Sigma repo. Microsoft doesn't write, test, or manage Sigma templates. The repo and templates are created, and collected, by the IT security community.
@@ -75,7 +75,7 @@ From the Azure portal, you can view Azure AD Audit logs and download as comma se
75
75
***Identity Protection** - detect risk on workload identities across sign-in behavior and offline indicators of compromise
76
76
*[Securing workload identities with Identity Protection](..//identity-protection/concept-workload-identity-risk.md)
77
77
78
-
Use the remainder of the article for recommendations on what to monitor and alert. The following tables are organized by threat type. See links to pre-built solutions or samples following the table. Build alerts using the previously mentioned tools.
78
+
Use the remainder of the article for recommendations on what to monitor and alert. Refer to the tables, organized by threat type. See links to pre-built solutions or samples following the table. Build alerts using the previously mentioned tools.
79
79
80
80
## Consumer accounts
81
81
@@ -124,7 +124,7 @@ Identity Provider deleted by non-approved actors | High | Azure AD Access Review
124
124
| Redirect URI configuration changes | High | Azure AD logs | Service-Core Directory<br>Category-ApplicationManagement<br>Activity: Update Application<br>Success – Property Name AppAddress | Look for URIs not using HTTPS*, URIs with wildcards at the end or the domain of the URL, URIs that are **not** unique to the application, URIs that point to a domain you don't control. |
125
125
| Changes to AppID URI | High | Azure AD logs | Service-Core Directory<br>Category-ApplicationManagement<br>Activity: Update Application<br>Activity: Update Service principal | Look for AppID URI modifications, such as adding, modifying, or removing the URI. |
126
126
| Changes to application ownership | Medium | Azure AD logs | Service-Core Directory<br>Category-ApplicationManagement<br>Activity: Add owner to application | Look for instances of users added as application owners outside normal change management activities. |
127
-
| Changes to log-out URL | Low | Azure AD logs | Service-Core Directory<br>Category-ApplicationManagement<br>Activity: Update Application<br>-and-<br>Activity: Update service principle | Look for modifications to a sign-out URL. Blank entries or entries to non-existent locations would stop a user from terminating a session.
127
+
| Changes to sign out URL | Low | Azure AD logs | Service-Core Directory<br>Category-ApplicationManagement<br>Activity: Update Application<br>-and-<br>Activity: Update service principle | Look for modifications to a signout URL. Blank entries or entries to non-existent locations would stop a user from terminating a session.
0 commit comments