Skip to content

Commit 0a1c14d

Browse files
committed
fixing syntax & updating macro
1 parent b33f7b0 commit 0a1c14d

File tree

2 files changed

+4
-3
lines changed

2 files changed

+4
-3
lines changed

detections/cloud/azure_ad_service_principal_enumeration.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,9 @@ search: >-
1717
| eval spn=coalesce(servicePrincipalb,servicePrincipalv1) | stats min(_time) as _time dc(spn) as spn_count values(user) as user values(user_category) as user_category values(src_category) as src_category count by src tenantId properties.userAgent
1818
| rename properties.userAgent as user_agent
1919
| where spn_count>9 | `azure_ad_service_principal_enumeration_filter`
20-
how_to_implement: Run this detection over historical data to identify then tune out any known services which may be performing this action. Thresholds can be lowered or raised to meet requirements.
21-
The Splunk Add-on for Microsoft Cloud Services add-on is required to ingest MicrosoftGraphActivityLogs via Azure EventHub. See reference for links for further details on how to onboard this log source.
20+
how_to_implement: >-
21+
Run this detection over historical data to identify then tune out any known services which may be performing this action. Thresholds can be lowered or raised to meet requirements.
22+
The Splunk Add-on for Microsoft Cloud Services add-on is required to ingest MicrosoftGraphActivityLogs via Azure EventHub. See reference for links for further details on how to onboard this log source.
2223
known_false_positives: Unknown
2324
references:
2425
- https://github.com/SpecterOps/AzureHound

macros/ms_defender.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
definition: source="WinEventLog:Microsoft-Windows-Windows Defender/Operational"
1+
definition: ( source="WinEventLog:Microsoft-Windows-Windows Defender/Operational" OR source="XmlWinEventLog:Microsoft-Windows-Windows Defender/Operational"
22
description: customer specific splunk configurations(eg- index, source, sourcetype).
33
Replace the macro definition with configurations for your Splunk Environment.
44
name: ms_defender

0 commit comments

Comments
 (0)