DS0015 Application Log
Events collected by third-party services such as mail servers, web applications, or other appliances (not by the native OS or platform)1
Item | Value |
---|---|
ID | DS0015 |
Platforms | Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS |
Collection Layers | Cloud Control Plane, Host |
Version | 1.0 |
Created | 20 October 2021 |
Last Modified | 11 May 2022 |
Data Components
Application Log Content
Logging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
References
-
Confluence Support. (2021, April 22). Working with Confluence Logs. Retrieved September 23, 2021. ↩
-
Microsoft Threat Intelligence Center, Microsoft Detection and Response Team, Microsoft 365 Defender Research Team . (2022, August 24). MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone. Retrieved September 28, 2022. ↩
-
Mike Burns. (2020, September 30). Detecting Microsoft 365 and Azure Active Directory Backdoors. Retrieved September 28, 2022. ↩
-
SensePost. (2017, September 21). NotRuler - The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange. Retrieved February 4, 2019. ↩
-
Slack Help Center. (n.d.). View Access Logs for your workspace. Retrieved April 10, 2023. ↩
-
Microsoft. (2006, August 31). DHCP Server Operational Events. Retrieved March 7, 2022. ↩
-
Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020. ↩
-
Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020. ↩
-
Stepanic, D.. (2020, January 13). Embracing offensive tooling: Building detections against Koadic using EQL. Retrieved November 30, 2020. ↩
-
US-CERT. (2015, November 13). Compromised Web Servers and Web Shells - Threat Awareness and Guidance. Retrieved June 8, 2016. ↩
-
Schroeder, W. & Christensen, L. (2021, June 22). Certified Pre-Owned - Abusing Active Directory Certificate Services. Retrieved August 2, 2022. ↩
-
Microsoft. (2022, February 15). Email exfiltration controls for connectors. Retrieved May 27, 2022. ↩
-
Shoemaker, E. (2015, December 31). Solution: Monitor DHCP Scopes and Detect Man-in-the-Middle Attacks with PRTG and PowerShell. Retrieved March 7, 2022. ↩
-
Sutherland, S. (2016, March 7). Maintaining Persistence via SQL Server – Part 1: Startup Stored Procedures. Retrieved July 8, 2019. ↩
-
Metcalf, S. (2018, May 6). Trimarc Research: Detecting Password Spraying with Security Event Auditing. Retrieved January 16, 2019. ↩
-
Dr. Nestori Syynimaa. (2021, January 31). BPRT unleashed: Joining multiple devices to Azure AD and Intune. Retrieved March 4, 2022. ↩
-
Microsoft. (2022, February 18). Manage device identities by using the Azure portal. Retrieved April 13, 2022. ↩
-
Cid, D.. (2015, August 2). BIND9 – Denial of Service Exploit in the Wild. Retrieved April 26, 2019. ↩
-
Microsoft Threat Intelligence Center. (2021, October 25). NOBELIUM targeting delegated administrative privileges to facilitate broader attacks. Retrieved January 31, 2022. ↩
-
Damian Pfammatter. (2018, September 17). Hidden Inbox Rules in Microsoft Exchange. Retrieved October 12, 2021. ↩
-
McMichael, T.. (2015, June 8). Exchange and Office 365 Mail Forwarding. Retrieved October 8, 2019. ↩
-
Chris Taylor. (2017, October 5). When Phishing Starts from the Inside. Retrieved October 8, 2019. ↩