
Summary
This detection rule is designed to identify changes made to the federation settings within the Azure Active Directory (AAD). It specifically looks for events related to modifications of federation settings that are indicative of either unauthorized access or manipulation. The rule triggers when the 'ActivityDisplayName' matches 'Set federation settings on domain', capturing actions that could potentially impact the security posture of the domain being monitored. The detection is set to evaluate login activities from users or applications, ensuring any modifications are legitimate and intentional. This plays a critical role in maintaining the integrity of federated identity management and safeguarding against initial access tactics commonly employed by threat actors. The conditions outlined may lead to false positives, especially when modifications are carried out by system administrators or routine administrative actions. This necessitates thorough verification of the user identity and other contextual parameters to authenticate the legitimacy of the action.
Categories
- Cloud
- Identity Management
- Azure
Data Sources
- User Account
- Application Log
- Cloud Service
Created: 2021-09-06