AD FS Database Local SQL Statements

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


'This hunting query uses Application events from the "MSSQL$MICROSOFT##WID" provider to collect SQL statements run against an AD FS database (e.g Windows Internal Database (WID)). A threat actor might want to extract the AD FS data configuration settings with a SQL statement or modify it with an UPDATE SQL statement. In order to use this query you need to create a server audit and database audit specification on your AD FS database. Reference: https://github.com/Azure/SimuLand/blob/main/3_simula

Attribute Value
Type Hunting Query
Solution GitHub Only
ID 81fab62b-ef92-487a-9c35-a91a116309e6
Severity Medium
Tactics Collection
Techniques T1005
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
Event EventID == "33205"
EventLog == "Application"
Source == "MSSQL$MICROSOFT##WID"
?

Associated Connectors

The following connectors provide data for this content item:

Connector Solution
ESI-Opt2ExchangeServersEventLogs Microsoft Exchange Security - Exchange On-Premises

Solutions: Microsoft Exchange Security - Exchange On-Premises


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries