-
Notifications
You must be signed in to change notification settings - Fork 594
[New Rule] Threat Intelligence Signal - Microsoft Defender for Office 365 #4994
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
[New Rule] Threat Intelligence Signal - Microsoft Defender for Office 365 #4994
Conversation
Rule: New - GuidelinesThese guidelines serve as a reminder set of considerations when proposing a new rule. Documentation and Context
Rule Metadata Checks
New BBR Rules
Testing and Validation
|
rules/integrations/o365/initial_access_defender_for_m365_threat_intelligence_signal.toml
Outdated
Show resolved
Hide resolved
[[rule.threat]] | ||
framework = "MITRE ATT&CK" | ||
[[rule.threat.technique]] | ||
id = "T1566" | ||
name = "Phishing" | ||
reference = "https://attack.mitre.org/techniques/T1566/" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this true for all generated signals?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
type = "query" | ||
|
||
query = ''' | ||
event.dataset: "o365.audit" and event.code: "ThreatIntelligence" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Would it make sense to adjust this event in the integrations to gave event.kind
set to alert
, so we automatically push an alert for it using the default promotion rule?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great question. Honestly I do not see why not other than keeping them separate for our visibility. Checking telemetry, I see we have several promotions for compliance related alerts. Based on docs from MSFT, this seems to be a good fit for adjusting event.kind
to alert
. The only other consideration is max signals for external alerts and potentially missing these if the threshold is hit because of compliance related alerts that are noisy. I'd rather keep separate as a rule.
…t_intelligence_signal.toml Co-authored-by: Isai <[email protected]>
…icrosoft-defender-for-office-365
Pull Request
Issue link(s):
Summary - What I changed
Adds a rule to promotion threat intel signals reported by Microsoft Defender for Office 365 via M365 audit logs. These were captured during Direct Send emulations for SPF failures. Signals should include, but not be limited to, phishing emails. Please see meta linked to related issue for more details on emulation and findings. No investigation fields were added as signals may change depending on behavior identified. Investigation guide will be GenAI populated as this is not specific behavior.
Note there are no specific "message" fields to override the rule name with or severity/risk fields either therefore these were not included. Since results may vary, I plan to monitor this rule over the next several weeks and adjust as necessary based on results.
How To Test
Checklist
bug
,enhancement
,schema
,maintenance
,Rule: New
,Rule: Deprecation
,Rule: Tuning
,Hunt: New
, orHunt: Tuning
so guidelines can be generatedmeta:rapid-merge
label if planning to merge within 24 hoursContributor checklist