Lumen TI IPAddress in IdentityLogonEvents

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query maps Lumen IP indicators of compromise (IOCs) from threat intelligence (TI), by searching for matches in Azure AD sign-in logs.

Attribute Value
Type Analytic Rule
Solution Lumen Defender Threat Feed
ID a7cd18cd-1503-47ec-8dca-65d750540637
Severity Medium
Kind Scheduled
Tactics CommandAndControl
Techniques T1071
Required Connectors LumenThreatFeedConnector, ThreatIntelligenceUploadIndicatorsAPI, AzureActiveDirectory
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
AADManagedIdentitySignInLogs ?
AADNonInteractiveUserSignInLogs ?
AADServicePrincipalSignInLogs ?
ADFSSignInLogs ?
ThreatIntelIndicators ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Lumen Defender Threat Feed