forked from erant10/sentinel-content
-
Notifications
You must be signed in to change notification settings - Fork 3
/
HuntingTest
38 lines (38 loc) · 1.37 KB
/
HuntingTest
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"type": "Microsoft.OperationalInsights/workspaces/savedSearches",
"apiVersion": "2020-08-01",
"name": "[concat(parameters('workspace'), '/AADConditionalAccessDisabled')]",
"location": "[resourceGroup().location]",
"properties": {
"eTag": "*",
"displayName": "Azure DevOps- AAD Conditional Access Disabled",
"category": "Hunting Queries",
"query": "AzureDevOpsAuditing\n| where OperationName ==\"OrganizationPolicy.PolicyValueUpdated\"\n| where Data.PolicyName == \"Policy.EnforceAADConditionalAccess\"\n| where Data.PolicyValue == \"OFF\"\n| extend timestamp = TimeGenerated, AccountCustomEntity = ActorUPN, IPCustomEntity = IpAddress\n",
"version": 1,
"tags": [
{
"name": "description",
"value": "This hunting query identifies Azure DevOps activities where organization AADConditionalAccess policy disable by the admin"
},
{
"name": "tactics",
"value": "Persistence,DefenseEvasion"
},
{
"name": "relevantTechniques",
"value": "T1098,T1562"
}
]
}
}
]
}