Skip to content

Commit b474a81

Browse files
terrancedejesusimays11w0rk3r
authored
[Rule Tuning] Update Azure / M365 Index Patterns and Lookback Windows (#5155)
* [Rule Tuning] Update Azure / M365 Index Patterns and Lookback Windows <!-- Thank you for your interest in and contributing to Detection Rules! There are a few simple things to check before submitting your pull request that can help with the review process. You should delete these items from your submission, but they are here to help bring them to your attention. --> # Pull Request *Issue link(s)*: * #5154 <!-- Add Related Issues / PRs for context. Eg: Related to elastic/repo#999 Resolves #123 If there is no issue link, take extra care to write a clear summary and label the PR just as you would label an issue to give additional context to reviewers. --> ## Summary - What I changed Adjusts Azure / M365 rules regarding lookback windows, interval and index scopes. Please see related issue for more details. <!-- Summarize your PR. Animated gifs are 💯. Code snippets are ⚡️. Examples & screenshots are 🔥 --> ## How To Test <!-- Some examples of what you could include here are: * Links to GitHub action results for CI test improvements * Sample data before/after screenshots (or short videos showing how something works) * Copy/pasted commands and output from the testing you did in your local terminal window * If tests run in GitHub, you can 🪁or 🔱, respectively, to indicate tests will run in CI * Query used in your stack to verify the change --> ## Checklist <!-- Delete any items that are not applicable to this PR. --> - [ ] Added a label for the type of pr: `bug`, `enhancement`, `schema`, `maintenance`, `Rule: New`, `Rule: Deprecation`, `Rule: Tuning`, `Hunt: New`, or `Hunt: Tuning` so guidelines can be generated - [ ] Added the `meta:rapid-merge` label if planning to merge within 24 hours - [ ] Secret and sensitive material has been managed correctly - [ ] Automated testing was updated or added to match the most common scenarios - [ ] Documentation and comments were added for features that require explanation ## Contributor checklist - Have you signed the [contributor license agreement](https://www.elastic.co/contributor-agreement)? - Have you followed the [contributor guidelines](https://github.com/elastic/detection-rules/blob/main/CONTRIBUTING.md)? * fixing timestamps * Update rules/integrations/azure/initial_access_entra_illicit_consent_grant_via_registered_application.toml Co-authored-by: Isai <[email protected]> * Update rules/integrations/azure/credential_access_azure_key_vault_excessive_retrieval.toml Co-authored-by: Jonhnathan <[email protected]> * update dates * Update rules/integrations/o365/initial_access_microsoft_365_illicit_consent_grant_via_registered_application.toml * Update rules/integrations/o365/initial_access_microsoft_365_illicit_consent_grant_via_registered_application.toml --------- Co-authored-by: Isai <[email protected]> Co-authored-by: Jonhnathan <[email protected]>
1 parent b451ff8 commit b474a81

File tree

62 files changed

+173
-169
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

62 files changed

+173
-169
lines changed

rules/integrations/azure/credential_access_azure_full_network_packet_capture_detected.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2021/08/12"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/09/26"
66

77
[rule]
88
author = ["Austin Songer"]
@@ -19,8 +19,8 @@ false_positives = [
1919
rule.
2020
""",
2121
]
22-
from = "now-25m"
23-
index = ["filebeat-*", "logs-azure*"]
22+
from = "now-9m"
23+
index = ["logs-azure.activitylogs-*", "filebeat-*"]
2424
language = "kuery"
2525
license = "Elastic License v2"
2626
name = "Azure Full Network Packet Capture Detected"

rules/integrations/azure/credential_access_storage_account_key_regenerated.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/08/19"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/09/26"
5+
updated_date = "2025/09/30"
66

77
[rule]
88
author = ["Elastic"]
@@ -18,8 +18,8 @@ false_positives = [
1818
or locations should be investigated.
1919
""",
2020
]
21-
from = "now-25m"
22-
index = ["filebeat-*", "logs-azure*"]
21+
from = "now-9m"
22+
index = ["logs-azure.activitylogs-*", "filebeat-*"]
2323
language = "kuery"
2424
license = "Elastic License v2"
2525
name = "Azure Storage Account Key Regenerated"

rules/integrations/azure/defense_evasion_azure_automation_runbook_deleted.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,16 @@
22
creation_date = "2020/09/01"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/09/26"
66

77
[rule]
88
author = ["Elastic"]
99
description = """
1010
Identifies when an Azure Automation runbook is deleted. An adversary may delete an Azure Automation runbook in order to
1111
disrupt their target's automated business operations or to remove a malicious runbook for defense evasion.
1212
"""
13-
from = "now-25m"
14-
index = ["filebeat-*", "logs-azure*"]
13+
from = "now-9m"
14+
index = ["logs-azure.activitylogs-*", "filebeat-*"]
1515
language = "kuery"
1616
license = "Elastic License v2"
1717
name = "Azure Automation Runbook Deleted"

rules/integrations/azure/defense_evasion_azure_blob_permissions_modified.toml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2021/09/22"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/09/26"
66

77
[rule]
88
author = ["Austin Songer"]
@@ -17,7 +17,8 @@ false_positives = [
1717
Exceptions can be added to this rule to filter expected behavior.
1818
""",
1919
]
20-
index = ["filebeat-*", "logs-azure*"]
20+
from = "now-9m"
21+
index = ["logs-azure.activitylogs-*", "filebeat-*"]
2122
language = "kuery"
2223
license = "Elastic License v2"
2324
name = "Azure Blob Permissions Modification"

rules/integrations/azure/defense_evasion_azure_diagnostic_settings_deletion.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/08/17"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/09/26"
5+
updated_date = "2025/09/30"
66

77
[rule]
88
author = ["Elastic"]
@@ -18,8 +18,8 @@ false_positives = [
1818
from the rule.
1919
""",
2020
]
21-
from = "now-25m"
22-
index = ["filebeat-*", "logs-azure*"]
21+
from = "now-9m"
22+
index = ["logs-azure.activitylogs-*", "filebeat-*"]
2323
language = "kuery"
2424
license = "Elastic License v2"
2525
name = "Azure Diagnostic Settings Deletion"

rules/integrations/azure/defense_evasion_event_hub_deletion.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/08/18"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/09/26"
5+
updated_date = "2025/09/30"
66

77
[rule]
88
author = ["Elastic"]
@@ -17,8 +17,8 @@ false_positives = [
1717
be investigated. If known behavior is causing false positives, it can be exempted from the rule.
1818
""",
1919
]
20-
from = "now-25m"
21-
index = ["filebeat-*", "logs-azure*"]
20+
from = "now-9m"
21+
index = ["logs-azure.activitylogs-*", "filebeat-*"]
2222
language = "kuery"
2323
license = "Elastic License v2"
2424
name = "Azure Event Hub Deletion"

rules/integrations/azure/defense_evasion_firewall_policy_deletion.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/08/18"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/09/26"
5+
updated_date = "2025/09/30"
66

77
[rule]
88
author = ["Elastic"]
@@ -17,8 +17,8 @@ false_positives = [
1717
hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
1818
""",
1919
]
20-
from = "now-25m"
21-
index = ["filebeat-*", "logs-azure*"]
20+
from = "now-9m"
21+
index = ["logs-azure.activitylogs-*", "filebeat-*"]
2222
language = "kuery"
2323
license = "Elastic License v2"
2424
name = "Azure Firewall Policy Deletion"

rules/integrations/azure/defense_evasion_frontdoor_firewall_policy_deletion.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2021/08/01"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/09/26"
5+
updated_date = "2025/09/30"
66

77
[rule]
88
author = ["Austin Songer"]
@@ -19,8 +19,8 @@ false_positives = [
1919
is causing false positives, it can be exempted from the rule.
2020
""",
2121
]
22-
from = "now-25m"
23-
index = ["filebeat-*", "logs-azure*"]
22+
from = "now-9m"
23+
index = ["logs-azure.activitylogs-*", "filebeat-*"]
2424
language = "kuery"
2525
license = "Elastic License v2"
2626
name = "Azure Frontdoor Web Application Firewall (WAF) Policy Deleted"

rules/integrations/azure/defense_evasion_kubernetes_events_deleted.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2021/06/24"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/09/26"
66

77
[rule]
88
author = ["Austin Songer"]
@@ -18,8 +18,8 @@ false_positives = [
1818
investigated. If known behavior is causing false positives, it can be exempted from the rule.
1919
""",
2020
]
21-
from = "now-25m"
22-
index = ["filebeat-*", "logs-azure*"]
21+
from = "now-9m"
22+
index = ["logs-azure.activitylogs-*", "filebeat-*"]
2323
language = "kuery"
2424
license = "Elastic License v2"
2525
name = "Azure Kubernetes Events Deleted"

rules/integrations/azure/defense_evasion_network_watcher_deletion.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/08/31"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/09/26"
66

77
[rule]
88
author = ["Elastic"]
@@ -18,8 +18,8 @@ false_positives = [
1818
hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
1919
""",
2020
]
21-
from = "now-25m"
22-
index = ["filebeat-*", "logs-azure*"]
21+
from = "now-9m"
22+
index = ["logs-azure.activitylogs-*", "filebeat-*"]
2323
language = "kuery"
2424
license = "Elastic License v2"
2525
name = "Azure Network Watcher Deletion"

0 commit comments

Comments
 (0)