+ SECUREKusto Query LanguageMicrosoft Defender for Endpoint

Detect Scattered Spider Defense Evasion via Conditional Access Policies

Description

This KQL query focuses on identifying modifications to Conditional Access Policies, a tactic employed by threat actors like Scattered Spider for defense evasion. The rule includes two queries: one for detecting updates to conditional access policies, specifically changes in ‘locations’ and ‘excludeLocations’, and another for identifying the addition of trusted locations, which can be indicative of an attacker trying to bypass security measures.

Risk

The risk addressed here is the manipulation of access controls to evade detection and maintain persistent access. Modifying conditional access policies can allow attackers to operate undetected within a network, as these changes might weaken the security posture or create blind spots.

Query

Microsoft Defender For Endpoint
Kusto
AuditLogs
| where OperationName =~ "Update conditional access policy" and TargetResources has_all ('locations','excludeLocations')

References

Leave a Reply

Your email address will not be published. Required fields are marked *