Detection rules › Kusto Query Language

AD FS Remote Auth Sync Connection

Source
upstream

'This detection uses Security events from the "AD FS Auditing" provider to detect suspicious authentication events on an AD FS server. The results then get correlated with events from the Windows Filtering Platform (WFP) to detect suspicious incoming network traffic on port 80 on the AD FS server. This could be a sign of a threat actor trying to use replication services on the AD FS server to get its configuration settings and extract sensitive information such as AD FS certificates. In order to use this query you need to enable AD FS auditing on the AD FS Server. References: https://docs.microsoft.com/windows-server/identity/ad-fs/troubleshooting/ad-fs-tshoot-logging https://twitter.com/OTR_Community/status/1387038995016732672'

MITRE ATT&CK coverage

TacticTechniques
CollectionT1005 Data from Local System

Event coverage

ProviderEvent IDTitle
Security-Auditing412AD FS authentication failure.
Security-Auditing501AD FS proxy authentication request.
Security-Auditing5156The Windows Filtering Platform has permitted a connection.

Stages and Predicates

Stage 1: source

SecurityEvent

Stage 2: where

Computer eq "ADFS_Servers"

Stage 3: where

EventID eq "412"

Stage 4: extend

Stage 5: extend

Stage 6: join

Stage 7: join

Stage 8: project

Stage 9: extend

Stage 10: extend

Stage 11: extend

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Computerin
  • ADFS_Servers
EventIDeq
  • 412