Legacy IOC based Threat Protection

Legacy IOC based Threat Protection Logo

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Solutions Index


Attribute Value
Publisher Microsoft Corporation
Support Tier Microsoft
Support Link https://support.microsoft.com
Categories domains
Version 3.0.5
Author Microsoft - support@microsoft.com
First Published 2022-12-19
Solution Folder Legacy IOC based Threat Protection
Marketplace Azure Marketplace · Popularity: 🔵 Medium (56%)
Pre-requisites SquidProxy, Windows Server DNS, CiscoASA, PaloAlto-PAN-OS, Microsoft Defender XDR, Azure Firewall, zscaler1579058425289.zscaler_internet_access_mss, Infoblox NIOS, GoogleCloudPlatformDNS, NXLogDNSLogs, CiscoUmbrella, Corelight, Amazon Web Services, Windows Forwarded Events, Microsoft Sysmon For Linux, Microsoft 365, Windows Security Events, Microsoft Entra ID, Azure Activity, F5 Big-IP, Fortinet FortiGate Next-Generation Firewall connector for Microsoft Sentinel, Check Point, Common Event Format, Windows Firewall

Microsoft Security Research, based on ongoing trends and exploits creates content that help identify existence of known IOCs based on known prevalent attacks and threat actor tactics/techniques, such as Nobelium, Gallium, Solorigate, etc. This solution contains packaged content written on some legacy IOCs that have been prevalent in the past but may still be relevant.

For details on the required solutions, see the Pre-requisites section below.

Contents

Pre-requisites

This solution depends on 23 other solution(s):

Solution
Amazon Web Services
Azure Activity
Azure Firewall
Check Point
CiscoASA
CiscoUmbrella
Common Event Format
Corelight
F5 Big-IP
Fortinet FortiGate Next-Generation Firewall connector for Microsoft Sentinel
GoogleCloudPlatformDNS
Infoblox NIOS
Microsoft 365
Microsoft Defender XDR
Microsoft Entra ID
Microsoft Sysmon For Linux
NXLogDNSLogs
PaloAlto-PAN-OS
SquidProxy
Windows Firewall
Windows Forwarded Events
Windows Security Events
Windows Server DNS

Data Connectors

This solution does not include its own data connectors but uses connectors from dependency solutions:

Tables Used

This solution queries 9 table(s) from its content items:

Table Used By Content
AzureDiagnostics Hunting
AzureNetworkAnalytics_CL Hunting
CommonSecurityLog Hunting
DeviceFileEvents Hunting
DeviceProcessEvents Hunting
Event Hunting
SecurityEvent Hunting
VMConnection Hunting
WindowsEvent Hunting

Internal Tables

The following 1 table(s) are used internally by this solution's content items:

Table Used By Content
SecurityAlert Hunting

Content Items

This solution includes 10 content item(s):

Content Type Count
Hunting Queries 10

Hunting Queries

Name Tactics Tables Used
Connection from external IP to OMI related Ports Reconnaissance, InitialAccess AzureDiagnostics
AzureNetworkAnalytics_CL
VMConnection
Dev-0056 Command Line Activity November 2021 CommandAndControl DeviceProcessEvents
SecurityEvent
WindowsEvent
Internal use:
SecurityAlert
Dev-0322 Command Line Activity November 2021 Persistence, LateralMovement, CommandAndControl DeviceProcessEvents
Internal use:
SecurityAlert
Dev-0322 Command Line Activity November 2021 (ASIM Version) Persistence, LateralMovement, CommandAndControl Internal use:
SecurityAlert
Dev-0322 File Drop Activity November 2021 Persistence, CommandAndControl DeviceFileEvents
DeviceProcessEvents
Internal use:
SecurityAlert
Dev-0322 File Drop Activity November 2021 (ASIM Version) Persistence, CommandAndControl Internal use:
SecurityAlert
Known Nylon Typhoon Registry modifications patterns Persistence Event
SecurityEvent
WindowsEvent
Nylon Typhoon Command Line Activity November 2021 Collection DeviceProcessEvents
SecurityEvent
WindowsEvent
Internal use:
SecurityAlert
Retrospective hunt for Forest Blizzard IP IOCs CommandAndControl CommonSecurityLog
Internal use:
SecurityAlert
SolarWinds Inventory Execution DeviceProcessEvents
Event
SecurityEvent
WindowsEvent

Release Notes

Version Date Modified (DD-MM-YYYY) Change History
3.0.5 03-06-2024 Added missing AMA Data Connector reference in Hunting Query
3.0.4 22-02-2024 Tagged for dependent solutions for deployment
3.0.3 19-12-2023 Corrected typo mistake Microsoft Windows DNS to Windows Server DNS
3.0.2 12-12-2023 Removed deprecated Analytical Rules
3.0.1 07-11-2023 Changes for rebranding from Azure Active Directory to Microsoft Entra ID & Microsoft 365 Defender to Microsoft Defender XDR
3.0.0 19-05-2023 Deprecating outdated IOC Based Analytic Rules

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Solutions Index