-
Notifications
You must be signed in to change notification settings - Fork 594
Labels
Domain: CloudDomain: IdentityIntegration: Azureazure related rulesazure related rulesRule: Tuningtweaking or tuning an existing ruletweaking or tuning an existing ruleTeam: TRADE
Description
Link to Rule
Rule Tuning Type
False Negatives - Enhancing detection of true threats that were previously missed.
Description
Rule needs tuned for the following reasons:
- Update name of the rule
- Replace Azure AD references with Entra ID
- Add investigation guide details specific to the behavior
- Add missing query contents to catch MFA settings disabled by user (phishing)
- Missing tags
- Update MITRE mappings
Note - The volume of alerts are not relatively high compared to other rules, however, disabling MFA is only anomalous and there is little room to exclude FPs with this rule. Additionally, this rule only catches user settings being changed (by the user or an admin) for disabling MFA. Conditional access policy changes, such as removing a user when the CAP enforces MFA, is not straight forward for detection.
Example Data
No response
Metadata
Metadata
Assignees
Labels
Domain: CloudDomain: IdentityIntegration: Azureazure related rulesazure related rulesRule: Tuningtweaking or tuning an existing ruletweaking or tuning an existing ruleTeam: TRADE