Certificate-Based Authentication Enabled
Detects when certificate based authentication has been enabled in an Azure Active Directory tenant.
Sigma rule (View on GitHub)
1title: Certificate-Based Authentication Enabled
2id: c2496b41-16a9-4016-a776-b23f8910dc58
3status: test
4description: Detects when certificate based authentication has been enabled in an Azure Active Directory tenant.
5references:
6 - https://posts.specterops.io/passwordless-persistence-and-privilege-escalation-in-azure-98a01310be3f
7 - https://goodworkaround.com/2022/02/15/digging-into-azure-ad-certificate-based-authentication/
8author: Harjot Shah Singh, '@cyb3rjy0t'
9date: 2024-03-26
10tags:
11 - attack.persistence
12 - attack.privilege-escalation
13 - attack.t1556
14logsource:
15 product: azure
16 service: auditlogs
17detection:
18 selection:
19 OperationName: 'Authentication Methods Policy Update'
20 TargetResources.modifiedProperties|contains: 'AuthenticationMethodsPolicy'
21 condition: selection
22falsepositives:
23 - Unknown
24level: medium
References
Related rules
- New Root Certificate Authority Added
- AWS Identity Center Identity Provider Change
- Abuse of Service Permissions to Hide Services Via Set-Service
- Abuse of Service Permissions to Hide Services Via Set-Service - PS
- Account Tampering - Suspicious Failed Logon Reasons