Document toolboxDocument toolbox

Release 14 - Out-of-the-box alerts

Detection name

Detection description

Devo table / Data source / Category

Update

SecOpsO365AuthExcessiveFailedLoginsSingleSource

Detects multiple failed authentications from a single IP in Office365.

auth.all

New alert

SecOpsAccountsCreatedRemovedWithinFourHours

Detects user accounts that are created and delete within a four time period.

box.all.win

Updated logic to prevent false positives using strict ordering

SecOpsAWSPublicS3BucketExposed

This alert filters PutBucketAcl cloudtrail events that come from the S3 service. The alert then extracts each URI and Permission pair from the raw event message. The alert then checks if the URI is equal to http://acs.amazonaws.com/groups/global/AllUsers or http://acs.amazonaws.com/groups/global/AuthenticatedUsers and if the permission is READ, READ_ACP, WRITE, WRITE_ACP, or FULL_CONTROL. The alert will trigger if any of these pairs meet both criteria. This alert will only extract the first five permissions and URIs of a message.

cloud.aws.cloudtrail

Updated logic to prevent false positives