Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Expand
title365 Sus Mailbox Delegation

Adversaries may use the compromised account to send messages to other accounts in the network of the target organization while creating inbox rules.

Source table → cloud.office365.management.exchange

Expand
titleNew Federated Domain

The addition of a new Federated domain may be a normal activity. However, these events need to be followed closely, as they may indicate federated credential abuse or a backdoor via federated identities.

Source table → cloud.office365.management.exchange

Expand
titleExcessive SSO Login Failures

Adversaries may use brute-force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained.

Source table → cloud.office365.management.azureactivedirectory

Expand
titleExcessive Auth Failure Attempts

This detection is triggered when a user account attempts an excessive number of authentication attempts with a failed status result in a short time window.

Source table → cloud.office365.management.azureactivedirectory

Expand
titleDisable MFA

Adversaries may modify authentication mechanisms and processes to access user credentials, bypass authentication mechanisms or enable otherwise unwarranted access to accounts.

Source table → cloud.office365.management.azureactivedirectory

Expand
titleBypass MFA via IP

This activity is not necessarily malicious. However, these events need to be followed closely. Attackers are often known to use this technique so that they can bypass the MFA system.

Source table → cloud.office365.management

Expand
titleAdded Service Principal

This detection is triggered when new Service Principal credentials have been added in Azure.

Source table → cloud.office365.management.azureactivedirectory

Expand
titleMailbox Audit Bypass

The mailbox audit is responsible for logging specified mailbox events. Attackers may attempt to bypass this mechanism to conceal actions taken.

Source table → cloud.office365.management.exchange