Azure - User Investigation
Azure Enrichment and Remediation Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.9.0 and later.
This playbook performs an investigation on a specific user in Azure environments, using queries and logs from Azure Log Analytics to locate the following activities performed by the user:
- Script-based user agent usage
- Administrative user activities
- Security rules and policies changes
- Failed login attempt
- MFA failed login attempt
- Login attempt from an uncommon country
- Anomalies activities
- Risky users
- Uncommon high volume of actions
- Action uncommonly performed by the user
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
IntegrationsAzure Log Analytics
#
Scripts- SetAndHandleEmpty
- SetMultipleValues
#
Commandsazure-log-analytics-execute-query
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
Username | The username to investigate. | Optional | |
AzureSearchTime | The Search Time for the Azure Log Analytics search query. Default value: ago(1d) | ago(7d) | Optional |
failedLogonThreshold | The threshold number of failed logons by the user. Required to determine how many failed logon events count as suspicious events. | 20 | Optional |
MfaAttemptThreshold | The threshold number of MFA failed logons by the user. Required to determine how many MFA failed logon events count as suspicious events. | 10 | Optional |
#
Playbook OutputsPath | Description | Type |
---|---|---|
AzureScriptBasedUserAgentEvents | Script-based user agent events used by the user in the Azure environment. | string |
CountAzureEvents.AzureScriptBasedUserAgentCount | The number of script-based user agent usages by the user in the Azure environment. | number |
AzureAdminActivitiesEvents | Administrative activities performed by the user in the Azure environment. | string |
CountAzureEvents.AzureAdminActivitiesCount | The number of administrative activities performed by the user in the Azure environment. | number |
AzureSecurityRulesChangeEvents | Security rules that were changed by the user in the Azure environment. | string |
CountAzureEvents.AzureSecurityRulesChangeCount | The number of security rules that were changed by the user in the Azure environment. | number |
AzureUnsuccessSecurityRulesChangeEvents | Unsuccessful attempts to change security rules by the user in the Azure environment. | string |
CountAzureEvents.AzureUnsuccessSecurityRulesChangeCount | The number of unsuccessful attempts to change security rules by the user in the Azure environment. | number |
AzureFailLoginCount | The number of failed logins by the user in the Azure environment. | number |
AzureFailLoginMFACount | The number of failed logins by the user using MFA in the Azure environment. | number |
AzureAnomaliesEvents | Anomaly events on the user in the Azure environment. | string |
CountAzureEvents.AzureAnomaliesCount | The number of anomaly events on the user in the Azure environment. | number |
AzureRiskyUserCount | The number of events where the user was defined as a risky user in the Azure environment. | number |
AzureUncommonCountryLogonEvents | Uncommon country logon events by the user in the Azure environment. | string |
CountAzureEvents.AzureUncommonCountryLogonCount | The number of uncommon country logon events by the user in the Azure environment. | number |
AzureUncommonVolumeEvents | Uncommon volume events by the user in the Azure environment. | string |
CountAzureEvents.AzureUncommonVolumeCount | The number of uncommon volume events by the user in the Azure environment. | number |
AzureUncommonActivitiesEvents | Uncommon activity events by the user in the Azure environment. | string |
CountAzureEvents.AzureUncommonActivitiesCount | The number of uncommon activity events by the user in the Azure environment. | number |