Azure AD Locking Account
Description
Accepts user, to be disabled using Azure AD Graph connector. This playbook produces a normalized observables output for each user and device.
- Type: Investigation
- Product: Splunk SOAR
- Apps: Azure AD Graph
- Last Updated: 2023-05-08
- Author: Teoderick Contreras, Splunk
- ID: c3c0157d-7da0-46cb-8b97-327ee92f591c
- Use-cases:
- Phishing
- Endpoint
Associated Detections
How To Implement
This input playbook requires the Azure AD Graph connector to be configured. It is designed to work in conjunction with the Dynamic Attribute Lookup playbook or other playbooks in the same style.
D3FEND
ID | Technique | Definition | Category |
---|---|---|---|
D3-AL | Account Locking | The process of temporarily disabling user accounts on a system or domain. | Credential Eviction |
Explore Playbook
Required field
Reference
source | version: 1