Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Rule Tuning] Azure Active Directory High Risk Sign-in => Also alert on failed #3585

Open
willem-dhaese opened this issue Apr 10, 2024 · 0 comments
Assignees
Labels
community Rule: Tuning tweaking or tuning an existing rule

Comments

@willem-dhaese
Copy link

willem-dhaese commented Apr 10, 2024

"Azure Active Directory High Risk Sign-in"

We noticed it's important to also alert on failed outcomes. Customers who don't want failed outcomes can exclude with an exception.

Link to rule

https://www.elastic.co/guide/en/security/current/azure-active-directory-high-risk-sign-in.html

Description

Current query:

event.dataset:azure.signinlogs and
  (azure.signinlogs.properties.risk_level_during_signin:high or azure.signinlogs.properties.risk_level_aggregated:high) and
  event.outcome:(success or Success)

Change to:

event.dataset:azure.signinlogs and
  (azure.signinlogs.properties.risk_level_during_signin:high or azure.signinlogs.properties.risk_level_aggregated:high)
@willem-dhaese willem-dhaese added the Rule: Tuning tweaking or tuning an existing rule label Apr 10, 2024
@w0rk3r w0rk3r self-assigned this May 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
community Rule: Tuning tweaking or tuning an existing rule
Projects
None yet
Development

No branches or pull requests

2 participants