Skip to content

Commit 2365d91

Browse files
fixed additional rule names
1 parent 044d8fa commit 2365d91

File tree

4 files changed

+8
-8
lines changed

4 files changed

+8
-8
lines changed

rules/cross-platform/initial_access_azure_o365_with_network_alert.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ updated_date = "2025/07/30"
77
[rule]
88
author = ["Elastic"]
99
description = """
10-
This rule correlate Azure or Office 356 mail successful sign-in events with network security alerts by source.ip.
10+
This rule correlate Entra-ID or Microsoft 365 mail successful sign-in events with network security alerts by source address.
1111
Adversaries may trigger some network security alerts such as reputation or other anomalies before accessing cloud
1212
resources.
1313
"""
@@ -19,7 +19,7 @@ false_positives = [
1919
from = "now-60m"
2020
language = "esql"
2121
license = "Elastic License v2"
22-
name = "Microsoft 365 or Entra ID Sign-in from a Suspicious Source"
22+
name = "M365 or Entra ID Identity Sign-in from a Suspicious Source"
2323
note = """## Triage and analysis
2424
2525
### Investigating Microsoft 365 or Entra ID Sign-in from a Suspicious Source
@@ -99,7 +99,7 @@ from logs-o365.audit-*, logs-azure.signinlogs-*, .alerts-security.*
9999
| eval
100100
Esql.source_ip_mail_access_case = case(event.dataset == "o365.audit" and event.action == "MailItemsAccessed" and event.outcome == "success", to_ip(source.ip), null),
101101
Esql.source_ip_azure_signin_case = case(event.dataset == "azure.signinlogs" and event.outcome == "success", to_ip(source.ip), null),
102-
Esql.source_ip_network_alert_case = case(kibana.alert.rule.name == "external alerts" and not event.dataset in ("o365.audit", "azure.signinlogs"), to_ip(source.ip), null)
102+
Esql.source_ip_network_alert_case = case(kibana.alert.rule.rule_id == "eb079c62-4481-4d6e-9643-3ca499df7aaa" and not event.dataset in ("o365.audit", "azure.signinlogs"), to_ip(source.ip), null)
103103
104104
// aggregate by source ip
105105
| stats

rules/integrations/azure/credential_access_azure_entra_susp_device_code_signin.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/12/02"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/12/02"
5+
updated_date = "2025/12/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -20,10 +20,10 @@ false_positives = [
2020
from = "now-9m"
2121
language = "esql"
2222
license = "Elastic License v2"
23-
name = "Suspicious Microsoft Entra ID Concurrent Sign-Ins via DeviceCode"
23+
name = "Entra ID OAuth Device Code Flow with Concurrent Sign-ins"
2424
note = """## Triage and analysis
2525
26-
### Investigating Suspicious Microsoft Entra ID Concurrent Sign-Ins via DeviceCode
26+
### Investigating Entra ID OAuth Device Code Flow with Concurrent Sign-ins
2727
2828
### Possible investigation steps
2929

rules/integrations/azure/credential_access_entra_id_excessive_account_lockouts.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ integration = ["azure"]
44
maturity = "production"
55
min_stack_version = "9.0.0"
66
min_stack_comments = "Bug fix in threshold rules."
7-
updated_date = "2025/12/08"
7+
updated_date = "2025/12/10"
88

99
[rule]
1010
author = ["Elastic"]

rules_building_block/entra_id_identity_protection_risk_detections.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ from = "now-9m"
2121
index = ["logs-azure.identity_protection-*"]
2222
language = "kuery"
2323
license = "Elastic License v2"
24-
name = "Microsoft Entra ID Protection - Risk Detections"
24+
name = "Entra ID Protection - Risk Detection"
2525
references = [
2626
"https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#risk-types-and-detection",
2727
]

0 commit comments

Comments
 (0)