detection-rules icon indicating copy to clipboard operation
detection-rules copied to clipboard

[New Rule] Azure Modify Trusted Domains

Open bm11100 opened this issue 4 years ago • 2 comments

Description

Hardening Strategies for Microsoft 365 to Defend Against UNC2452 - thanks to @dstepanic17 for sharing the whitepaper.

The Azure AD Audit log and Unified Audit log records when a domain is configured for federated authentication and the modification of federated realm objects. In most organizations, domain federation settings will be updated infrequently. Organizations should create rules to alert on the log events generated by these activities and audit them to ensure they are legitimate.

Required Info

  • Eventing Sources:
  • Target Operating Systems:
  • Platforms
  • Target ECS Version: x.x.x
  • New fields required in ECS for this?
  • Related issues or PRs

Optional Info

  • References: https://www.fireeye.com/content/dam/collateral/en/wp-m-unc2452.pdf

Example Data

“Operation”: “Set domain authentication.” “Operation”: “Set federation settings on domain.”

bm11100 avatar Jan 20 '21 15:01 bm11100

Detection Command Line:

process.args : (*Update-MSOLFederatedDomain* OR *Update-MSOLFederatedDomain*)

OperationName

azure.auditlogs.operation_name : (“Set domain authentication.” OR “Set federation settings on domain.”)

Fields:

  • userPrincipalName
  • OperationName

MITRE

Tactic Technique ID Technique Name Sub-Technique Name
Privilege Escalation T1484.002 Domain Policy Modification Domain Trust Modification
Privilege Escalation T1134 Access Token Manipulation

austinsonger avatar Apr 21 '21 00:04 austinsonger

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

botelastic[bot] avatar Aug 25 '21 11:08 botelastic[bot]