diff --git a/queries/account_enabled_microsoft_defender_for_identity.yml b/queries/account_enabled_microsoft_defender_for_identity.yml new file mode 100644 index 0000000..e8eeb6a --- /dev/null +++ b/queries/account_enabled_microsoft_defender_for_identity.yml @@ -0,0 +1,43 @@ +# --- Query Metadata --- +# Human-readable name for the query. Will be displayed as the title. +name: Account Enabled (Microsoft Defender for Identity) + +# MITRE ATT&CK technique IDs +mitre_ids: + - T1078 + +# Description of what the query does and its purpose. +description: | + Detects when a previously disabled user account is re‑enabled in Active Directory. While this may be part of normal administrative activity, it can also indicate an attempt to restore access to an account for unauthorized use and should be reviewed. + +# The author or team that created the query. +author: Kundan Kumar + +# The required log sources to run this query successfully in Next-Gen SIEM. +log_sources: + - Identity + +# The CrowdStrike modules required to run this query. +cs_required_modules: + - Identity + +# Tags for filtering and categorization. +tags: + - Detection + +# --- Query Content --- +# The actual CrowdStrike Query Language (CQL) code. +# Using the YAML block scalar `|` allows for multi-line strings. +cql: | + #Vendor = "microsoft" + | #event.module = "defender-identity" + | Vendor.category = "AdvancedHunting-IdentityDirectoryEvents" + | event.action = "account enabled" + | #event.outcome = "success" + | table([@timestamp,user.name,user.target.name,Vendor.properties.AccountUpn,Vendor.properties.TargetAccountUpn]) + +# Explanation of the query. +# Using the YAML block scalar `|` allows for multi-line strings. +# Uses markdown for formatting on the webpage. +explanation: | + Detects when a previously disabled user account is re‑enabled in Active Directory. While this may be part of normal administrative activity, it can also indicate an attempt to restore access to an account for unauthorized use and should be reviewed.