Rule Library

Sigma Rules

20 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhighexperimental

Azure Login Bypassing Conditional Access Policies

Detects a successful login to the Microsoft Intune Company Portal which could allow bypassing Conditional Access Policies and InTune device trust using a tool like TokenSmith.

Microsoft 365audit
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Josh Nickels+1Wed Jan 08cloud
Detectionhightest

Disabling Multi Factor Authentication

Detects disabling of Multi Factor Authentication.

Microsoft 365audit
TA0003 · PersistenceTA0005 · Defense EvasionTA0006 · Credential AccessT1556.006 · Multi-Factor Authentication
Splunk Threat Research Team (original rule)+1Mon Sep 18cloud
Detectionmediumtest

New Federated Domain Added

Detects the addition of a new Federated Domain.

Microsoft 365audit
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.002 · Trust Modification
Splunk Threat Research Team (original rule)+1Mon Sep 18cloud
Detectionmediumtest

New Federated Domain Added - Exchange

Detects the addition of a new Federated Domain.

Microsoft 365exchange
TA0003 · PersistenceT1136.003 · Cloud Account
Splunk Threat Research Team (original rule)+1Tue Feb 08cloud
Detectionmediumtest

Activity from Suspicious IP Addresses

Detects when a Microsoft Cloud App Security reported users were active from an IP address identified as risky by Microsoft Threat Intelligence. These IP addresses are involved in malicious activities, such as Botnet C&C, and may indicate compromised account.

Microsoft 365threat_detection
TA0011 · Command and ControlT1573 · Encrypted Channel
Austin SongerMon Aug 23cloud
Detectionmediumtest

Activity Performed by Terminated User

Detects when a Microsoft Cloud App Security reported for users whose account were terminated in Azure AD, but still perform activities in other platforms such as AWS or Salesforce. This is especially relevant for users who use another account to manage resources, since these accounts are often not terminated when a user leaves the company.

Microsoft 365threat_management
TA0040 · Impact
Austin SongerMon Aug 23cloud
Detectionmediumtest

Activity from Anonymous IP Addresses

Detects when a Microsoft Cloud App Security reported when users were active from an IP address that has been identified as an anonymous proxy IP address.

Microsoft 365threat_management
TA0011 · Command and ControlT1573 · Encrypted Channel
Austin SongerMon Aug 23cloud
Detectionmediumtest

Activity from Infrequent Country

Detects when a Microsoft Cloud App Security reported when an activity occurs from a location that wasn't recently or never visited by any user in the organization.

Microsoft 365threat_management
TA0011 · Command and ControlT1573 · Encrypted Channel
Austin SongerMon Aug 23cloud
Detectionmediumtest

Data Exfiltration to Unsanctioned Apps

Detects when a Microsoft Cloud App Security reported when a user or IP address uses an app that is not sanctioned to perform an activity that resembles an attempt to exfiltrate information from your organization.

Microsoft 365threat_management
TA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Austin SongerMon Aug 23cloud
Detectionmediumtest

Microsoft 365 - Impossible Travel Activity

Detects when a Microsoft Cloud App Security reported a risky sign-in attempt due to a login associated with an impossible travel.

Microsoft 365threat_management
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Jul 06cloud
Detectionmediumtest

Logon from a Risky IP Address

Detects when a Microsoft Cloud App Security reported when a user signs into your sanctioned apps from a risky IP address.

Microsoft 365threat_management
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Aug 23cloud
Detectionmediumtest

Microsoft 365 - Potential Ransomware Activity

Detects when a Microsoft Cloud App Security reported when a user uploads files to the cloud that might be infected with ransomware.

Microsoft 365threat_management
TA0040 · ImpactT1486 · Data Encrypted for Impact
Austin SongerThu Aug 19cloud
Detectionmediumtest

PST Export Alert Using eDiscovery Alert

Alert on when a user has performed an eDiscovery search or exported a PST file from the search. This PST file usually has sensitive information including email body content

Microsoft 365threat_management
TA0009 · CollectionT1114 · Email Collection
Sorina IonescuTue Feb 08cloud
Detectionmediumtest

PST Export Alert Using New-ComplianceSearchAction

Alert when a user has performed an export to a search using 'New-ComplianceSearchAction' with the '-Export' flag. This detection will detect PST export even if the 'eDiscovery search or exported' alert is disabled in the O365.This rule will apply to ExchangePowerShell usage and from the cloud.

Microsoft 365threat_management
TA0009 · CollectionT1114 · Email Collection
Nikita KhalimonenkovThu Nov 17cloud
Detectionlowtest

Suspicious Inbox Forwarding

Detects when a Microsoft Cloud App Security reported suspicious email forwarding rules, for example, if a user created an inbox rule that forwards a copy of all emails to an external address.

Microsoft 365threat_management
TA0010 · ExfiltrationT1020 · Automated Exfiltration
Austin SongerSun Aug 22cloud
Detectionmediumtest

Suspicious OAuth App File Download Activities

Detects when a Microsoft Cloud App Security reported when an app downloads multiple files from Microsoft SharePoint or Microsoft OneDrive in a manner that is unusual for the user.

Microsoft 365threat_management
TA0010 · Exfiltration
Austin SongerMon Aug 23cloud
Detectionmediumtest

Microsoft 365 - Unusual Volume of File Deletion

Detects when a Microsoft Cloud App Security reported a user has deleted a unusual a large volume of files.

Microsoft 365threat_management
TA0040 · ImpactT1485 · Data Destruction
Austin SongerThu Aug 19cloud
Detectionmediumtest

Microsoft 365 - User Restricted from Sending Email

Detects when a Security Compliance Center reported a user who exceeded sending limits of the service policies and because of this has been restricted from sending email.

Microsoft 365threat_management
TA0001 · Initial AccessT1199 · Trusted Relationship
Austin SongerThu Aug 19cloud
Threat Huntmediumtest

Mail Forwarding/Redirecting Activity In O365

Detects email forwarding or redirecting activity in O365 Audit logs.

Microsoft 365audit
TA0009 · CollectionT1114.003 · Email Forwarding RuleTA0005 · Defense EvasionT1564.008 · Email Hiding Rules+3
RedCanary Team+1Wed Oct 11cloud
Threat Huntmediumexperimental

Inbox Rules Creation Or Update Activity in O365

Detects inbox rule creation or update via O365 Audit logs, a technique commonly observed in Business Email Compromise (BEC) attacks to hide emails. The usage of inbox rules can be a sign of a compromised mailbox, where an attacker is attempting to evade detections by suppressing or redirecting incoming emails. Analysts should review these rules in context, validate whether they reflect normal user behavior, and correlate with other indicators such as unusual login activity or recent mailbox rule modifications.

Microsoft 365audit
TA0005 · Defense EvasionT1564.008 · Email Hiding RulesTA0010 · ExfiltrationTA0009 · Collection+2
Marco Pedrinazzi (InTheCyber)Fri Jan 09cloud