Activity from Anonymous IP Addresses

Detects when a Microsoft Cloud App Security reported when users were active from an IP address that has been identified as an anonymous proxy IP address.

Sigma rule (View on GitHub)

 1title: Activity from Anonymous IP Addresses
 2id: d8b0a4fe-07a8-41be-bd39-b14afa025d95
 3status: test
 4description: Detects when a Microsoft Cloud App Security reported when users were active from an IP address that has been identified as an anonymous proxy IP address.
 5references:
 6    - https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
 7    - https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference
 8author: Austin Songer @austinsonger
 9date: 2021/08/23
10modified: 2022/10/09
11tags:
12    - attack.command_and_control
13    - attack.t1573
14logsource:
15    service: threat_management
16    product: m365
17detection:
18    selection:
19        eventSource: SecurityComplianceCenter
20        eventName: 'Activity from anonymous IP addresses'
21        status: success
22    condition: selection
23falsepositives:
24    - User using a VPN or Proxy
25level: medium

References

Related rules

to-top