Last active
January 7, 2025 14:11
-
-
Save WesSec/b393789b993ebd79024ea5cbb66a3139 to your computer and use it in GitHub Desktop.
Detect roadrunner/ AD Graph via Company Portal app
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
AADNonInteractiveUserSignInLogs | |
| where TimeGenerated > ago(30d) | |
// Filter for Company portal | |
| where AppId == "9ba1a5c7-f17a-4de9-a1f1-6178c8d51223" | |
// Filter for the Windows Azure AD api | |
| where ResourceIdentity == "00000002-0000-0000-c000-000000000000" | |
| extend parseddevice = parse_json(DeviceDetail) | |
// Filter for devices without DeviceID (those are non joined devices, likely an attacker) | |
| where isempty(parseddevice.deviceId) | |
// Filter operating systems or devices in the enviroment which are known non joined | |
// | where parseddevice.operatingSystem !contains "" | |
// Filter known good accounts or other stuff here | |
// | where Identity !contains "" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment