Skip to content

Latest commit

 

History

History
37 lines (29 loc) · 1.57 KB

CustomDetectionDisabled.md

File metadata and controls

37 lines (29 loc) · 1.57 KB

Custom Detection Disabled

Query Information

MITRE ATT&CK Technique(s)

Technique ID Title Link
T1070 Indicator Removal https://attack.mitre.org/techniques/T1070/

Description

This query lists all the custom detections that have been disabled in Defender For XDR. The information is available in the CloudAppEvents table. This allows you to audit custom detection rule status changed and alert on disable activities (from unknown users).

Risk

An actor has gotten access to an account that is able to disabled custom detections. By disabling custom detections they are able to stay undetected.

References

Defender XDR

CloudAppEvents
| where ActionType == "ChangeCustomDetectionRuleStatus"
| where RawEventData.IsEnabled == "false"
| extend RuleName = tostring(parse_json(RawEventData.RuleName)), Query = tostring(parse_json(RawEventData.Query)), Actor = tostring(parse_json(RawEventData.UserId)), IsEnabled = RawEventData.IsEnabled
| project-reorder Timestamp, Actor, IsEnabled, RuleName, Query

Sentinel

CloudAppEvents
| where ActionType == "ChangeCustomDetectionRuleStatus"
| where RawEventData.IsEnabled == "false"
| extend RuleName = tostring(parse_json(RawEventData.RuleName)), Query = tostring(parse_json(RawEventData.Query)), Actor = tostring(parse_json(RawEventData.UserId)), IsEnabled = RawEventData.IsEnabled
| project-reorder TimeGenerated, Actor, IsEnabled, RuleName, Query