Skip to content

Instantly share code, notes, and snippets.

@WesSec
Last active January 7, 2025 14:11
Show Gist options
  • Save WesSec/b393789b993ebd79024ea5cbb66a3139 to your computer and use it in GitHub Desktop.
Save WesSec/b393789b993ebd79024ea5cbb66a3139 to your computer and use it in GitHub Desktop.
Detect roadrunner/ AD Graph via Company Portal app
AADNonInteractiveUserSignInLogs
| where TimeGenerated > ago(30d)
// Filter for Company portal
| where AppId == "9ba1a5c7-f17a-4de9-a1f1-6178c8d51223"
// Filter for the Windows Azure AD api
| where ResourceIdentity == "00000002-0000-0000-c000-000000000000"
| extend parseddevice = parse_json(DeviceDetail)
// Filter for devices without DeviceID (those are non joined devices, likely an attacker)
| where isempty(parseddevice.deviceId)
// Filter operating systems or devices in the enviroment which are known non joined
// | where parseddevice.operatingSystem !contains ""
// Filter known good accounts or other stuff here
// | where Identity !contains ""
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment