heroui logo

Slack Intune MDM Disabled

Panther Rules

View Source
Summary
The detection rule 'Slack Intune MDM Disabled' monitors Slack audit log actions for events where Microsoft Intune MDM (Mobile Device Management) is disabled. This rule serves as a critical security feature aimed at protecting the integrity of mobile app management within the Slack environment. When Intune MDM is disabled, it can allow malicious actors or unauthorized users to impair defenses and gain unauthorized access to sensitive data within the organization. The rule operates by analyzing logs from Slack to identify specific user actions that correlate with the disabling of Intune MDM, particularly looking for log entries where the action 'intune_disabled' occurs. The rule's severity level is classified as 'Critical', underlining the potential repercussions of such an event, as it can lead to further security vulnerabilities. The testing framework for this rule includes expected outcomes for both disabling Intune and user logout actions, ensuring that the detection mechanism can accurately discern between valid and suspicious user activities. By implementing this rule, organizations can fortify their security posture against potential defense evasion tactics, thereby enhancing their overall threat detection capabilities.
Categories
  • Cloud
  • Application
  • Identity Management
Data Sources
  • Application Log
ATT&CK Techniques
  • T1562.001
  • T0123
Created: 2022-09-02