Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This query detects the use of the built-in "Dynamics 365 Example Application" to access production environments. This generic app can not be restricted by Azure AD authorization controls and could be abused to gain unauthorized access via Web API.
| Attribute | Value |
|---|---|
| Type | Hunting Query |
| Solution | Microsoft Business Applications |
| ID | 90bcbd4e-e8b5-4a5d-9fe6-d0f9f0220b4a |
| Tactics | Execution |
| Techniques | T1106, T0834 |
| Required Connectors | Dataverse, AzureActiveDirectory |
| Source | View on GitHub |
This content item queries data from the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
DataverseActivity |
✓ | ✗ | ? |
SigninLogs |
✓ | ✗ | ? |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Hunting Queries · Back to Microsoft Business Applications