In-Progress

This commit is contained in:
Austin Songer 2021-08-23 18:55:29 +00:00
parent 1834324a16
commit 41786a1b63
6 changed files with 144 additions and 0 deletions

View File

@ -0,0 +1,24 @@
title: Microsoft 365 - Activity performed by terminated user
id:
status: experimental
description: Detects when a Microsoft Cloud App Security reported
author: Austin Songer @austinsonger
date: 2021/08/23
references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource:
category: ThreatManagement
service: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: "Activity performed by terminated user"
status: success
condition: selection
falsepositives:
-
level: medium
tags:
- attack.exfiltration
- attack.t1537

View File

@ -0,0 +1,24 @@
title: Microsoft 365 - Activity from infrequent country
id:
status: experimental
description: Detects when a Microsoft Cloud App Security reported
author: Austin Songer @austinsonger
date: 2021/08/23
references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource:
category:
service: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: "Activity from infrequent country"
status: success
condition: selection
falsepositives:
-
level: medium
tags:
- attack.initial_access
-

View File

@ -0,0 +1,24 @@
title: Microsoft 365 - Activity from anonymous IP addresses
id:
status: experimental
description: Detects when a Microsoft Cloud App Security reported
author: Austin Songer @austinsonger
date: 2021/08/23
references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource:
category:
service: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: "Activity from anonymous IP addresses"
status: success
condition: selection
falsepositives:
-
level: medium
tags:
- attack.initial_access
-

View File

@ -0,0 +1,24 @@
title: Microsoft 365 - Activity from suspicious IP addresses
id:
status: experimental
description: Detects when a Microsoft Cloud App Security reported
author: Austin Songer @austinsonger
date: 2021/08/23
references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource:
category:
service: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: "Activity from suspicious IP addresses"
status: success
condition: selection
falsepositives:
-
level: medium
tags:
- attack.initial_access
-

View File

@ -0,0 +1,24 @@
title: Microsoft 365 -
id:
status: experimental
description: Detects when a Microsoft Cloud App Security reported
author: Austin Songer @austinsonger
date: 2021/08/22
references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource:
category:
service: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: "Suspicious inbox forwarding"
status: success
condition: selection
falsepositives:
-
level: medium
tags:
- attack.initial_access
-

View File

@ -0,0 +1,24 @@
title: Microsoft 365 -
id:
status: experimental
description: Detects when a Microsoft Cloud App Security reported
author: Austin Songer @austinsonger
date: 2021/08/22
references:
- https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
- https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
logsource:
category:
service: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: "Suspicious OAuth app file download activities"
status: success
condition: selection
falsepositives:
-
level: medium
tags:
- attack.initial_access
-