Skip to content

[Rule Tuning] Suspicious Microsoft 365 Mail Access by ClientAppId #4807

@terrancedejesus

Description

@terrancedejesus

Link to Rule

https://github.com/elastic/detection-rules/blob/527372910675c7b955c64530a75c69b48c12a6d6/rules/integrations/o365/initial_access_microsoft_365_abnormal_clientappid.toml

Rule Tuning Type

None

Description

This rule needs to be tuned for the following reasons:

  • Extremely noisy in global alert telemetry, often most alerts are FPs
  • Whitelisted client application IDs need to be expanded and adjusted based on commonality across clusters alerts are pulled from
  • Needs to have the user types and login types adjusted to be user specific, not service principal or service, etc.
  • Should be tuned to focus solely on access that is bind audited
  • Reduce time window for New Terms to 14 days to increase performance

Example Data

No response

Metadata

Metadata

Type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions