Detect Scattered Spider Defense Evasion via Conditional Access Policies
Description
This KQL query focuses on identifying modifications to Conditional Access Policies, a tactic employed by threat actors like Scattered Spider for defense evasion. The rule includes two queries: one for detecting updates to conditional access policies, specifically changes in ‘locations’ and ‘excludeLocations’, and another for identifying the addition of trusted locations, which can be indicative of an attacker trying to bypass security measures.
Risk
The risk addressed here is the manipulation of access controls to evade detection and maintain persistent access. Modifying conditional access policies can allow attackers to operate undetected within a network, as these changes might weaken the security posture or create blind spots.
Query
Microsoft Defender For Endpoint
AuditLogs
| where OperationName =~ "Update conditional access policy" and TargetResources has_all ('locations','excludeLocations')