
Summary
The 'Azure AD AzureHound UserAgent Detected' detection rule identifies instances where the default user-agent string from AzureHound is present in Microsoft Graph Activity logs and NonInteractive User SignIn Logs. AzureHound is a reconnaissance tool that can be utilized by both security professionals and malicious actors to probe Azure AD environments. Its legitimate usage is for auditing Azure infrastructures, whereas unauthorized uses may indicate malicious reconnaissance or an intrusion attempt. This detection focuses on flagging unusual or unauthorized occurrences of the AzureHound user-agent, which may signify attempts to map Azure AD infrastructure for potential exploitation. Implementing this detection involves the ingestion of specific logs through the Splunk Add-on for Microsoft Cloud Services and is essential for maintaining security posture in Azure environments.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- Logon Session
- Application Log
- Cloud Service
ATT&CK Techniques
- T1087.004
- T1526
Created: 2025-01-06