Guest Users Invited To Tenant By Non Approved Inviters
Detects guest users being invited to tenant by non-approved inviters
Sigma rule (View on GitHub)
1title: Guest Users Invited To Tenant By Non Approved Inviters
2id: 4ad97bf5-a514-41a4-abd3-4f3455ad4865
3status: test
4description: Detects guest users being invited to tenant by non-approved inviters
5references:
6 - https://learn.microsoft.com/en-gb/entra/architecture/security-operations-user-accounts#monitoring-external-user-sign-ins
7author: MikeDuddington, '@dudders1'
8date: 2022-07-28
9tags:
10 - attack.privilege-escalation
11 - attack.persistence
12 - attack.defense-evasion
13 - attack.initial-access
14 - attack.t1078
15logsource:
16 product: azure
17 service: auditlogs
18detection:
19 selection:
20 Category: 'UserManagement'
21 OperationName: 'Invite external user'
22 filter:
23 InitiatedBy|contains: '<approved guest inviter use OR for multiple>'
24 condition: selection and not filter
25falsepositives:
26 - If this was approved by System Administrator.
27level: medium
References
Related rules
- AWS Key Pair Import Activity
- AWS Suspicious SAML Activity
- Account Created And Deleted Within A Close Time Frame
- Authentications To Important Apps Using Single Factor Authentication
- Azure Domain Federation Settings Modified