You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: detections/cloud/o365_multiple_os_vendors_authenticating_from_user.yml
+20-29Lines changed: 20 additions & 29 deletions
Original file line number
Diff line number
Diff line change
@@ -7,16 +7,17 @@ status: production
7
7
type: TTP
8
8
description: The following analytic identifies when multiple operating systems are used to authenticate to Azure/EntraID/Office 365 by the same user account over a short period of time. This activity could be indicative of attackers enumerating various logon capabilities of Azure/EntraID/Office 365 and attempting to discover weaknesses in the organizational MFA or conditional access configurations. Usage of the tools like "MFASweep" will trigger this detection.
9
9
data_source:
10
-
- O365
11
-
search: '`o365_management_activity` Operation IN (UserLoginFailed,UserLoggedIn)
12
-
| eval -time = _time
13
-
| bin _time span=15m
14
-
| stats values(Operation) as signature, values(ErrorNumber) as signature_id, values(OS) as os_name, dc(OS) as os_count, count, min(-time) as firstTime, max(-time) as lastTime by ClientIP, UserId, _time
`o365_management_activity` Operation IN (UserLoginFailed,UserLoggedIn)
13
+
| eval -time = _time
14
+
| bin _time span=15m
15
+
| stats values(Operation) as signature, values(ErrorNumber) as signature_id, values(OS) as os_name, dc(OS) as os_count, count, min(-time) as firstTime, max(-time) as lastTime by ClientIP, UserId, _time
how_to_implement: You must install the Splunk Microsoft Office 365 Add-on and ingest Office 365 management activity events. The thresholds set within the analytic (such as unique OS) are initial guidelines and should be customized based on the organization's user behavior and risk profile. Security teams are encouraged to adjust these thresholds to optimize the balance between detecting genuine threats and minimizing false positives, ensuring the detection is tailored to their specific environment.
21
22
known_false_positives: IP or users where the usage of multiple Operating systems is expected, filter accordingly.
22
23
references:
@@ -37,35 +38,25 @@ drilldown_searches:
37
38
search: '`o365_management_activity` Operation IN (UserLoginFailed,UserLoggedIn) "$user$"'
38
39
earliest_offset: $info_min_time$
39
40
latest_offset: $info_max_time$
41
+
rba:
42
+
message: The user account $user$ authenticated with $os_count$ unique operating system types over a short period from $src$.
43
+
risk_objects:
44
+
- field: user
45
+
type: user
46
+
score: 60
47
+
threat_objects:
48
+
- field: src
49
+
type: ip_address
40
50
tags:
41
51
analytic_story:
42
52
- Office 365 Account Takeover
43
53
asset_type: O365 Tenant
44
-
confidence: 75
45
-
impact: 80
46
-
message: The user account $user$ authenticated with $os_count$ unique operating system types over a short period from $src$.
0 commit comments