-
Notifications
You must be signed in to change notification settings - Fork 28
/
Copy pathazureEventHub_entra.rules
49 lines (41 loc) · 8.71 KB
/
azureEventHub_entra.rules
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
# Sagan azureEventHub_Entra.rules
# Copyright (c) 2009-2023. Quadrant Information Security <www.quadrantsec.com>
# All rights reserved.
#
# Please submit any custom rules or ideas to [email protected] or the sagan-sigs mailing list
#
#*************************************************************
# Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
# following conditions are met:
#
# * Redistributions of source code must retain the above copyright notice, this list of conditions and the following
# disclaimer.
# * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
# following disclaimer in the documentation and/or other materials provided with the distribution.
# * Neither the name of the nor the names of its contributors may be used to endorse or promote products derived
# from this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES,
# INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
# DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
# SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
# USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#
#*************************************************************
# rules by "Bryant Smith" <[email protected]>
# 11/01/2023
#Reference: https://learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-azure-monitor-sign-ins-log-schema
#Reference: https://learn.microsoft.com/en-us/entra/id-protection/howto-identity-protection-investigate-risk
#NonInteractiveUserSignInLogs
#alert any $HOME_NET any -> $HOME_NET any (msg:"[AZURE-EVENTHUB-ENTRA] Non-Interactive User Sign-In"; program:azureEventHub; json_content:".category",""NonInteractiveUserSignInLogs; reference:url,learn.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk; classtype:trojan-activity; parse_src_ip: 1; sid:5014024; rev:1; metadata:deployment Server,affected_product Microsoft_Entra,affected_version NONE,mitigation NONE,deprecation_reason NONE,tag NONE, created_at 2023_10_17, updated_at 2023_10_17, mitre_tactic_id TA0008, mitre_technique_id T1071;)
#RiskyUsers
#alert any $HOME_NET any -> $HOME_NET any (msg:"[AZURE-EVENTHUB-ENTRA] User identified as low risk level"; program:azureEventHub; json_content:".category","RiskyUsers"; json_content:".properties.riskLevel","low"; json_nocase; json_meta_content:".properties.riskState",atRisk,confirmedCompromised,unknownFutureValue; json_meta_nocase; reference:url,learn.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk; reference:url,learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-azure-monitor-sign-ins-log-schema; classtype:trojan-activity; parse_src_ip: 1; sid:5014025; rev:1; metadata:deployment Server,affected_product Microsoft_Entra,affected_version NONE,mitigation NONE,deprecation_reason NONE,tag NONE, created_at 2023_10_17, updated_at 2023_10_17, mitre_tactic_id TA0008, mitre_technique_id T1071;)
alert any $HOME_NET any -> $HOME_NET any (msg:"[AZURE-EVENTHUB-ENTRA] User identified as medium risk level"; program:azureEventHub; json_content:".category","RiskyUsers"; json_content:".properties.riskLevel","medium"; json_nocase; json_meta_content:".properties.riskState",atRisk,confirmedCompromised,unknownFutureValue; json_meta_nocase; reference:url,learn.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk; reference:url,learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-azure-monitor-sign-ins-log-schema; classtype:trojan-activity; parse_src_ip: 1; sid:5014026; rev:1; metadata:deployment Server,affected_product Microsoft_Entra,affected_version NONE,mitigation NONE,deprecation_reason NONE,tag NONE, created_at 2023_10_17, updated_at 2023_10_17, mitre_tactic_id TA0008, mitre_technique_id T1071;)
alert any $HOME_NET any -> $HOME_NET any (msg:"[AZURE-EVENTHUB-ENTRA] User identified as high risk level"; program:azureEventHub; json_content:".category","RiskyUsers"; json_content:".properties.riskLevel","high"; json_nocase; json_meta_content:".properties.riskState",atRisk,confirmedCompromised,unknownFutureValue; json_meta_nocase; reference:url,learn.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk; reference:url,learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-azure-monitor-sign-ins-log-schema; classtype:trojan-activity; parse_src_ip: 1; sid:5014027; rev:1; metadata:deployment Server,affected_product Microsoft_Entra,affected_version NONE,mitigation NONE,deprecation_reason NONE,tag NONE, created_at 2023_10_17, updated_at 2023_10_17, mitre_tactic_id TA0008, mitre_technique_id T1071;)
alert any $HOME_NET any -> $HOME_NET any (msg:"[AZURE-EVENTHUB-ENTRA] User identified risky but level hidden"; program:azureEventHub; json_content:".category","RiskyUsers"; json_content:".properties.riskLevel","hidden"; json_nocase; json_meta_content:".properties.riskState",atRisk,confirmedCompromised,unknownFutureValue; json_meta_nocase; reference:url,learn.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk; reference:url,learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-azure-monitor-sign-ins-log-schema; classtype:trojan-activity; parse_src_ip: 1; sid:5014028; rev:1; metadata:deployment Server,affected_product Microsoft_Entra,affected_version NONE,mitigation NONE,deprecation_reason NONE,tag NONE, created_at 2023_10_17, updated_at 2023_10_17, mitre_tactic_id TA0008, mitre_technique_id T1071;)
#UserRiskEvents
#alert any $HOME_NET any -> $HOME_NET any (msg:"[AZURE-EVENTHUB-ENTRA] Low level User Risk Event"; program:azureEventHub; json_content:".category","UserRiskEvents"; json_content:".properties.riskLevel","low"; json_nocase; json_meta_content:".properties.riskState",atRisk,confirmedCompromised,unknownFutureValue; json_meta_nocase; reference:url,learn.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk; reference:url,learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-azure-monitor-sign-ins-log-schema; classtype:trojan-activity; sid:5014029; rev:1; metadata:deployment Server,affected_product Microsoft_Entra,affected_version NONE,mitigation NONE,deprecation_reason NONE,tag NONE, created_at 2023_10_17, updated_at 2023_10_17, mitre_tactic_id TA0008, mitre_technique_id T1071;)
alert any $HOME_NET any -> $HOME_NET any (msg:"[AZURE-EVENTHUB-ENTRA] Medium level User Risk Event"; program:azureEventHub; json_content:".category","UserRiskEvents"; json_content:".properties.riskLevel","medium"; json_nocase; json_meta_content:".properties.riskState",atRisk,confirmedCompromised,unknownFutureValue; json_meta_nocase; json_map: "src_ip", ".properties.ipAddress"; reference:url,learn.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk; reference:url,learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-azure-monitor-sign-ins-log-schema; classtype:trojan-activity; sid:5014030; rev:1; metadata:deployment Server,affected_product Microsoft_Entra,affected_version NONE,mitigation NONE,deprecation_reason NONE,tag NONE, created_at 2023_10_17, updated_at 2023_10_17, mitre_tactic_id TA0008, mitre_technique_id T1071;)
alert any $HOME_NET any -> $HOME_NET any (msg:"[AZURE-EVENTHUB-ENTRA] High level User Risk Event"; program:azureEventHub; json_content:".category","UserRiskEvents"; json_content:".properties.riskLevel","high"; json_nocase; json_meta_content:".properties.riskState",atRisk,confirmedCompromised,unknownFutureValue; json_meta_nocase; reference:url,learn.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk; reference:url,learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-azure-monitor-sign-ins-log-schema; classtype:trojan-activity; parse_src_ip: 1; sid:5014031; rev:2; metadata:deployment Server,affected_product Microsoft_Entra,affected_version NONE,mitigation NONE,deprecation_reason NONE,tag NONE, created_at 2023_10_17, updated_at 2023_10_17, mitre_tactic_id TA0008, mitre_technique_id T1071;)