In today's digital workspace, safeguarding user accounts in Office 365 against compromises is a critical challenge for organizations. Azure Sentinel, Microsoft's premier cloud-native SIEM platform, plays a pivotal role in enhancing security measures within Office 365 environments. This blog post explores the native tools and techniques available through Azure Sentinel that organizations can leverage to effectively manage and investigate user account compromises.
Microsoft Azure Sentinel offers a robust set of capabilities for monitoring and investigating suspicious activities and compromised accounts within Office 365. Despite the complexity and scattered nature of security tools, Azure Sentinel provides a centralized and intuitive solution for security operations teams.
1. Tracking Logins with Azure Active Directory Integration
Azure Sentinel integrates seamlessly with Azure Active Directory, providing invaluable insights into authentication activities. This integration is crucial for identifying unauthorized access attempts and patterns indicative of compromised accounts, such as unusual login locations, new IP addresses, and unexpected client application usage.
The first step of an account compromise investigation often begins with identifying the attacker and authenticating to the environment. Azure Active Directory Sign-in logs are the most important resource to identify this activity. (Please note: if your organization uses a third-party identity provider, like Okta or Duo, records from that provider should replace or supplement the steps presented in this section). Access Azure Active Directory sign-in
A screen shot of this page is presented below:
To analyze the data presented in this interface, use the integrated filters presented in the UI, or download the data to Excel for analysis. Unauthorized logins in an Azure Active Directory environment typically display one or more of the following characteristics:
The following logs from a compromised user account demonstrate some of these characteristics:
Azure Sentinel enhances the visibility of security alerts within Office 365, including suspicious email forwarding rules, abnormal external file sharing, and potential data exfiltration attempts. By aggregating and analyzing alerts, Azure Sentinel helps identify and respond to security incidents more efficiently.
If an account has been compromised, the activity may have triggered Office 365 alerts. These records are available in the Office 365 Protection Portal.
A screen shot of this menu is presented below:
Key default alerts that may be indicative of an account compromise include:
Organizations can also establish custom alerts to detect potentially malicious actions specific to their tenant.
The Unified Audit Log in Office 365, accessible through Azure Sentinel, is a goldmine for investigating the actions taken by a compromised account. Azure Sentinel facilitates the examination of SharePoint and Exchange Online activities, enabling organizations to trace the attacker's movements and impact within the environment.
If we have identified an account compromise from Azure Active Directory Sign-Ins and Office alerts, we need to identify what actions the attacker may have taken, both to maintain persistence in the environment, to attack other tenants, or to exfiltrate data from the victim environment. Logs associated with the activity that the attacker took in Microsoft Exchange and SharePoint Online are accessible in the Unified Audit Log.
A screen shot of this page is presented below:
Please Note – if you access this URL, but don’t see any logs, you will need to enable audit logging.
Logs can also be exported from this menu. These logs are a combination of comma delimited and JSON by default. To parse them properly, follow the instructions here: https://docs.microsoft.com/en-us/microsoft-365/compliance/export-view-audit-log-records?view=o365-worldwide
Parsed logs from the unified audit log are presented in the following screen shot:
The Unified Audit Log can be used to trace SharePoint and Exchange online activities taken by the attacker in the environment.
Azure Sentinel's advanced analytics extend to monitoring email activities, helping to trace emails sent from compromised accounts. This capability is essential for understanding the scope of an attack and mitigating potential damages.
Message trace in the Security & Compliance Center follows email messages as they travel through your Exchange Online organization. Organizations can determine if a message was received, rejected, deferred, or delivered by the service. Message trace functionality in Office 365 is necessary if attackers send email messages using a victim's account. Visit the Email Message Trace menu.
This menu is presented in the following screen shot:
Looking ahead, Azure Sentinel is set to expand its capabilities, offering even more sophisticated detection and investigation tools for Office 365 and beyond. As organizations increasingly move their infrastructure and applications to the cloud, Azure Sentinel stands as a critical ally in securing digital assets against evolving threats.
Azure Sentinel represents a significant advancement in the fight against user account compromises in Office 365. By harnessing the power of Azure Sentinel, organizations can not only detect and investigate incidents more effectively but also enhance their overall security posture in the cloud. As we continue to explore Azure Sentinel's potential, its role in cloud security is undoubtedly poised for growth, offering a beacon of hope for organizations navigating the complexities of digital security.
Stay tuned for future posts where we will delve deeper into Azure Sentinel's additional security detection and investigation capabilities, further empowering organizations to safeguard their Office 365 environments against sophisticated cyber threats.