heroui logo

Microsoft Intune Mobile Apps

Splunk Security Content

View Source
Summary
The Microsoft Intune Mobile Apps detection rule focuses on the monitoring of application deployments and modifications within Microsoft Intune, identifying potentially malicious alterations to applications on managed devices. It works by analyzing activity logs from Azure Monitor, specifically looking for events related to mobile apps where actions such as creation, update, or deletion occur. This could be abused by attackers to deploy harmful applications under the guise of legitimate updates. The detection employs a Splunk query that parses the Azure Monitor activity logs to capture relevant information such as the type of action taken, the user responsible for the change, and the target application involved. It is crucial to have the correct logging configuration in place, utilizing the Splunk Add-on for Microsoft Cloud Services, to ensure all relevant Intune audit logs are captured effectively for analysis and alerting.
Categories
  • Cloud
  • Infrastructure
Data Sources
  • Cloud Service
ATT&CK Techniques
  • T1072
  • T1021.007
  • T1202
  • T1105
Created: 2025-01-07