Security News > 2021 > April > CISA Releases Tool to Detect Microsoft 365 Compromise

CISA Releases Tool to Detect Microsoft 365 Compromise
2021-04-09 16:55

The U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency has released a new tool to help with the detection of potential compromise within Microsoft Azure and Microsoft 365 environments.

Dubbed Aviary, the new tool is a dashboard that makes it easy to visualize and analyze output from Sparrow, the compromise detection tool that was released in December 2020.

Built by CISA to help with the detection of malicious activity related to SolarWinds compromise, Sparrow can be used by network defenders to hunt for potential malicious activity within Microsoft Azure Active Directory, Microsoft 365, and Office 365 environments.

With Sparrow, defenders can look out for domain authentication or federation modifications, find new and modified credentials in logs, detect privilege escalation, detect OAuth consent and users' consent to applications, identify anomalous SAML token sign-ins, and check the Graph API application permissions for service principals and apps in the environment, among others.

A Splunk-based dashboard, the newly released Aviary is meant to facilitate the analysis of output data from Sparrow.

The tool is now available on GitHub, with additional information on how to install Aviary, after running Sparrow, included in CISA's January announcement for the detection tool, which has been updated this week with instructions on using Aviary.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/1oWbCjE6M94/cisa-releases-tool-detect-microsoft-365-compromise

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Microsoft 365 50 1369 2819 161 4399