-
Notifications
You must be signed in to change notification settings - Fork 49
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Monitoring Cross-Tenant Abuse by Threat Actors.kql
- Loading branch information
Showing
1 changed file
with
15 additions
and
0 deletions.
There are no files selected for viewing
15 changes: 15 additions & 0 deletions
15
Sentinel/Monitoring Cross-Tenant Abuse by Threat Actors.kql
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
// Monitoring Cross-Tenant Abuse by Threat Actors | ||
|
||
// Lina Lau’s blog post on Xintra.org provides an insightful look into how attackers can misuse Microsoft Entra ID’s cross-tenant synchronization feature to move laterally between tenants with P1 and P2 licenses. By exploiting this feature, attackers can create new accounts in a victim’s tenant, enabling them to persist or move laterally even if their initial access is revoked. (The blog post link will be shared in the comment section.) | ||
|
||
// Defenders with P1 or P2 licenses should use the Sentinel KQL provided below to monitor for any changes to their Entra Cross-Tenant settings, helping to detect potential abuse of the cross-tenant synchronization. The KQL code can be downloaded from my SlimKQL GitHub Repository, which is featured on my LinkedIn profile (search for “Monitoring Cross-Tenant Abuse by Threat Actors”). | ||
|
||
// https://www.xintra.org/blog/lateral-movement-entraid-cross-tenant-synchronization | ||
|
||
AuditLogs | ||
| where TimeGenerated > ago(1h) | ||
| where Category == "CrossTenantAccessSettings" | ||
| where OperationName == "Update the company default cross-tenant access setting" or | ||
OperationName == "Add a partner to cross-tenant access setting" or | ||
OperationName == "Update a partner cross-tenant access setting" | ||
|