Detecting Office 365 attacks
You manage access to Office 365 resources and services across your organization. More and more companies are using Microsoft's Office 365 cloud offering, and yours is no exception. Attacks against Office 365 are increasing, and as part of your role you need to be able to detect these. These searches help you do this.
Microsoft: Office 365
How to use Splunk software for this use case
To deploy this use case, make sure that you have the Splunk ES Content Updates installed on your Splunk Enterprise Security deployment. This extensive content library empowers you to deploy out-of-the-box security detections and analytic stories to enhance your investigations and improve your security posture. If you do not have Splunk Enterprise Security, these detections will still give you an idea of what you can accomplish with SPL in the Splunk platform or with the free app, Splunk Security Essentials.
Some of the detections that can help you with this use case include:
- Add app role assignment grant user
- Added service principal
- Excessive SSO logon errors
- New federated domain added
- Bypass MFA via trusted IP
- Disable MFA
- Excessive authentication failures alert
- PST export alert
- Suspicious admin email forwarding
- Suspicious rights delegation
- Suspicious user email forwarding
In addition, Splunk Enterprise Security provides a number of other searches to help reinforce your cloud security posture, including:
Still need help with this use case? Most customers have OnDemand Services per their license support plan. Engage the ODS team at OnDemand-Inquires@splunk.