Solutions/Bitglass/Hunting Queries/BitglassRiskyUsers.yaml (24 lines of code) (raw):
id: 3f21e7e2-0226-412c-87f0-262700a64db0
name: Bitglass - Risky users
description: |
'Query searches for risky users.'
severity: Medium
requiredDataConnectors:
- connectorId: Bitglass
dataTypes:
- Bitglass
tactics:
- InitialAccess
relevantTechniques:
- T1078
query: |
Bitglass
| where TimeGenerated > ago(24h)
| where EventType =~ 'access'
| where EventResultDetails has_all ('Added', 'Risky Users')
| extend AccountCustomEntity = User
entityMappings:
- entityType: Account
fieldMappings:
- identifier: Name
columnName: AccountCustomEntity