Analytics Story: Azure Active Directory Persistence
Description
Monitor for activities and techniques associated with the execution of Persistence techniques against Azure Active Directory tenants.
Why it matters
Azure Active Directory (Azure AD) is Microsofts enterprise cloud-based identity and access management (IAM) service. Azure AD is the backbone of most of Azure services like Office 365. It can sync with on-premise Active Directory environments and provide authentication to other cloud-based systems via the OAuth protocol. According to Microsoft, Azure AD manages more than 1.2 billion identities and processes over 8 billion authentications per day. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. This analytic storic groups detections that can help security operations teams identify the potential execution of Persistence techniques targeting Azure Active Directory tenants.
Detections
Data Sources
| Name | Platform | Sourcetype | Source |
|---|---|---|---|
| Azure Active Directory | azure:monitor:aad |
Azure AD |
|
| Azure Active Directory Add member to role | azure:monitor:aad |
Azure AD |
|
| Azure Active Directory Add owner to application | azure:monitor:aad |
Azure AD |
|
| Azure Active Directory Add service principal | azure:monitor:aad |
Azure AD |
|
| Azure Active Directory Add unverified domain | azure:monitor:aad |
Azure AD |
|
| Azure Active Directory Consent to application | azure:monitor:aad |
Azure AD |
|
| Azure Active Directory Enable account | azure:monitor:aad |
Azure AD |
|
| Azure Active Directory Invite external user | azure:monitor:aad |
Azure AD |
|
| Azure Active Directory Reset password (by admin) | azure:monitor:aad |
Azure AD |
|
| Azure Active Directory Set domain authentication | azure:monitor:aad |
Azure AD |
|
| Azure Active Directory Update application | azure:monitor:aad |
Azure AD |
|
| Azure Active Directory Update user | azure:monitor:aad |
Azure AD |
|
| Azure Audit Create or Update an Azure Automation Runbook | mscs:azure:audit |
mscs:azure:audit |
|
| Azure Audit Create or Update an Azure Automation account | mscs:azure:audit |
mscs:azure:audit |
|
| Azure Audit Create or Update an Azure Automation webhook | mscs:azure:audit |
mscs:azure:audit |
|
| CrowdStrike ProcessRollup2 | Other | crowdstrike:events:sensor |
crowdstrike |
| Office 365 Universal Audit Log | Other | o365:management:activity |
o365 |
| Powershell Script Block Logging 4104 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-PowerShell/Operational |
|
| Sysmon EventID 1 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
| Windows Event Log Security 4688 | XmlWinEventLog |
XmlWinEventLog:Security |
|
| Windows Event Log Security 4724 | XmlWinEventLog |
XmlWinEventLog:Security |
|
| Windows Event Log Security 4725 | XmlWinEventLog |
XmlWinEventLog:Security |
|
| Windows Event Log Security 4726 | XmlWinEventLog |
XmlWinEventLog:Security |
References
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis
- https://azure.microsoft.com/en-us/services/active-directory/#overview
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-compare-azure-ad-to-ad
- https://attack.mitre.org/tactics/TA0003/
- https://microsoft.github.io/Azure-Threat-Research-Matrix/Persistence/Persistence/
Source: GitHub | Version: 2