Skip to content

Commit e27c252

Browse files
committed
Add Exposure Management
1 parent aba24fc commit e27c252

File tree

1 file changed

+35
-0
lines changed

1 file changed

+35
-0
lines changed
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
# Exposure-Management-Privileged-Account-Exposure
2+
3+
⚠️ Draft
4+
5+
Microsoft Security Exposure Management correlates insights from various Microsoft security solutions in the Defender XDR portal.
6+
The following query hunts for privileged cloud account credential exposure on assets and correlates additional accounts that sign-in to the same devices.
7+
This shows potential attack scenarios for credential theft or cached tokens.
8+
9+
## Query
10+
11+
```kusto
12+
ExposureGraphEdges
13+
| make-graph SourceNodeId --> TargetNodeId with ExposureGraphNodes on NodeId
14+
| graph-match (standardUser)-[obtains]-(exposedAsset)-[attacks]->(target)
15+
where standardUser.NodeLabel =~ 'user' and exposedAsset.NodeLabel =~ "device" and array_length( target.NodeProperties.rawData.assignedRoles) > 0
16+
project ExposedDevice = exposedAsset.NodeName, ExposedAdminAccount = target.NodeName, ExposedDirectoryRole = target.NodeProperties.rawData.assignedRoles, ExposedStandardAccount = standardUser.NodeName
17+
| summarize make_set(ExposedStandardAccount), make_set(ExposedDevice) by ExposedAdminAccount, tostring(ExposedDirectoryRole)
18+
```
19+
20+
## Hunt Tags
21+
22+
* **Author:** [Nicola Suter](https://nicolasuter.ch)
23+
* **License:** [MIT License](https://github.com/nicolonsky/ITDR/blob/main/LICENSE)
24+
25+
### Additional information
26+
27+
* <https://techcommunity.microsoft.com/t5/security-compliance-and-identity/introducing-microsoft-security-exposure-management/ba-p/4080907>
28+
29+
30+
### MITRE ATT&CK Tags
31+
32+
* **Tactic:** Credential Access (TA0006)
33+
* **Technique:**
34+
* Credentials from Password Stores (T1555)
35+
* Compromise Accounts (T1586)

0 commit comments

Comments
 (0)