Microsoft 365 SendAs permissions added

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when a user adds SendAs permissions.

Strategy

Monitor Microsoft 365 audit logs to look for the operation Add-RecipientPermission. SendAs permission allows a user or group members to send messages that appear to come from the specified mailbox, mail contact, mail user, or group. Attackers may configure this to allow them to impersonate a user and send messages on their behalf from their mailbox, allowing the attacker to persist in the organization or move laterally by phishing other users.

Triage and response

  1. Inspect the @Parameters.Trustee field to determine if the email address is external to your organization.
  2. Determine if there is a legitimate use case for adding SendAs permissions by contacting the user {{@usr.email}}.
  3. If {{@usr.email}} is not aware of the action:
    • Investigate other activities performed by users at the following attributes @usr.email, @Parameters.Trustee and @Parameters.Identity using the Cloud SIEM - User Investigation dashboard.
    • Begin your organization’s incident response process and investigate.

Changelog

  • 17 August 2023 - Updated query to replace attribute @threat_intel.results.subcategory:tor with @threat_intel.results.category:tor.
PREVIEWING: rtrieu/product-analytics-ui-changes