ID | Technique | Tactic |
---|---|---|
T1072 | Software Deployment Tools | Execution |
T1484 | Domain or Tenant Policy Modification | Lateral Movement |
T1021.007 | Cloud Services | Defense Evasion |
T1562.001 | Disable or Modify Tools | Privilege Escalation |
T1562.004 | Disable or Modify System Firewall | Lateral Movement |
Detection: Microsoft Intune DeviceManagementConfigurationPolicies
Description
Microsoft Intune device management configuration policies are a tool administrators can use to remotely manage policies and settings on intune managed devices. This functionality can also be abused to disable defences & evade detection. This detection identifies when a new device management configuration policy has been created.
Search
1`azure_monitor_activity` operationName="* DeviceManagementConfigurationPolicy*"
2| rename identity as user, properties.TargetObjectIds{} as TargetObjectId, properties.TargetDisplayNames{} as TargetDisplayName, properties.Actor.IsDelegatedAdmin as user_isDelegatedAdmin
3| eval details=mvzip('properties.Targets{}.ModifiedProperties{}.Name','properties.Targets{}.ModifiedProperties{}.New',": ")
4| rex field="operationName" "^(?P<action>\w+)\s"
5| replace "Patch" with "updated", "Create" with "created", "Delete", with "deleted", "assign", with "assigned" IN action
6| eval action=if(match(operationName ,"Assignment$"),"assigned",'action')
7| table _time operationName action user user_type user_isDelegatedAdmin TargetDisplayName TargetObjectId details status tenantId correlationId
8| `microsoft_intune_devicemanagementconfigurationpolicies_filter`
Data Source
Name | Platform | Sourcetype | Source |
---|---|---|---|
Azure Monitor Activity | Azure | 'azure:monitor:activity' |
'Azure AD' |
Macros Used
Name | Value |
---|---|
azure_monitor_activity | sourcetype=azure:monitor:activity |
microsoft_intune_devicemanagementconfigurationpolicies_filter | search * |
microsoft_intune_devicemanagementconfigurationpolicies_filter
is an empty macro by default. It allows the user to filter out any results (false positives) without editing the SPL.
Annotations
Default Configuration
This detection is configured by default in Splunk Enterprise Security to run with the following settings:
Setting | Value |
---|---|
Disabled | true |
Cron Schedule | 0 * * * * |
Earliest Time | -70m@m |
Latest Time | -10m@m |
Schedule Window | auto |
Creates Risk Event | False |
Implementation
The Splunk Add-on for Microsoft Cloud Services add-on is required to ingest In-Tune audit logs via Azure EventHub. To configure this logging, visit Intune > Tenant administration > Diagnostic settings > Add diagnostic settings & send events to the activity audit event hub. Deploy as a risk based alerting rule for quick deployment or perform baselining & tune accordingly.
Known False Positives
Legitimate adminstrative usage of this functionality will trigger this detection.
Associated Analytic Story
References
-
https://posts.specterops.io/death-from-above-lateral-movement-from-azure-to-on-prem-ad-d18cb3959d4d
-
https://securityintelligence.com/x-force/detecting-intune-lateral-movement/
Detection Testing
Test Type | Status | Dataset | Source | Sourcetype |
---|---|---|---|---|
Validation | ✅ Passing | N/A | N/A | N/A |
Unit | ✅ Passing | Dataset | Azure AD |
azure:monitor:activity |
Integration | ✅ Passing | Dataset | Azure AD |
azure:monitor:activity |
Replay any dataset to Splunk Enterprise by using our replay.py
tool or the UI.
Alternatively you can replay a dataset into a Splunk Attack Range
Source: GitHub | Version: 1