heroui logo

Microsoft Entra ID Suspicious Cloud Device Registration

Elastic Detection Rules

View Source
Summary
This detection rule by Elastic is designed to identify suspicious device registration activities within Microsoft Entra ID, particularly those possibly performed using the ROADtools toolkit. It watches for a specific sequence of events that point towards an unconventional mode of registering a cloud device, which can be indicative of session hijacking attempts or the misuse of device trust. Specifically, the rule looks for an "Add device" operation through the Device Registration Service that uses the `Microsoft.OData.Client` user agent, often associated with malicious activity, followed by the addition of registered users and owners to the device. The typical workflow includes verifying the OS version and the URN used in the registration process, to filter out legitimate provisioning flows from potentially malicious ones. If identified as malicious, there are prescribed steps for response and remediation, which include revoking access and reviewing audit logs to prevent further exploitation.
Categories
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Cloud Service
  • Application Log
  • Active Directory
  • Network Traffic
ATT&CK Techniques
  • T1098
  • T1098.005
Created: 2025-06-13