Azure-Sentinel/Hunting Queries/Microsoft 365 Defender/General queries/insider-threat-detection-qu...

29 строки
1.7 KiB
YAML

id: 2eb45b94-4848-4e02-9679-ceb10b2445f2
name: insider-threat-detection-queries (8)
description: |
Intent:
- Use MTP capability to look for insider threat potential risk indicators
- Indicators would then serve as the building block for insider threat risk modeling in subsequent tools
Definition of Insider Threat:
"The potential for an individual who has or had authorized access to an organization's assets to use their access, either maliciously or unintentionally, to act in a way that could negatively affect the organization."
This collection of queries describes the different indicators that could be used to model and look for patterns suggesting an increased risk of an individual becoming a potential insider threat.
Note: no single indicator should be used as a lone determinant of insider threat activity, but should be part of an overall program to understand the increased risk to your organization's critical assets. This in turn is used to feed an investigation by a formal insider threat program to look at the context associated with the whole person to understand the implication of a set of indicators.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
dataTypes:
- DeviceProcessEvents
tactics:
- Initial access
- Persistence
- Exfiltration
query: |
// --------------------------------------------------------------------------------------------------------------------------- //
//
//Usage of Source Control Management (SCM) Tool
//
//Update SCMTools with any additional SCM software specific to an organization.
let SCMTools = pack_array ("git.exe", "svn.exe", "hg.exe");
DeviceProcessEvents
| where FileName has_any (SCMTools)
or ProcessCommandLine has_any (SCMTools)