Skip to content

Commit

Permalink
Update UserImpersonateByAAID.yaml
Browse files Browse the repository at this point in the history
removed the time condition
  • Loading branch information
4R9UN authored Aug 31, 2023
1 parent 4ebb640 commit ad82a6b
Showing 1 changed file with 0 additions and 2 deletions.
2 changes: 0 additions & 2 deletions Detections/MultipleDataSources/UserImpersonateByAAID.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,6 @@ relevantTechniques:
query: |
// Retrieve SecurityAlerts generated within the last day
SecurityAlert
| where TimeGenerated >= ago(1d)
// Filter alerts for Azure Active Directory Identity Protection and High severity
| where ProductName has "Azure Active Directory Identity Protection"
| where AlertSeverity == "High"
Expand All @@ -40,7 +39,6 @@ query: |
// Perform an inner join with AWS CloudTrail events
| join kind=inner (
AWSCloudTrail
| where TimeGenerated >= ago(1d)
| where isempty(ErrorMessage)
//|where EventSource == "iam.amazonaws.com"
| extend UserType = tostring(parse_json(RequestParameters).userType)
Expand Down

0 comments on commit ad82a6b

Please sign in to comment.