In November, we announced the availability of a new Cloud Connector for all users, including Free SIEM – Microsoft Defender for Cloud Apps; a Synology parser integration; and various improvements to help streamline investigations, improve workflows, and enhance our users' overall experience managing security with Blumira.
New Cloud Connector Integration: Microsoft Defender for Cloud Apps is a multipurpose software as a service (SaaS) security solution that combines security posture management, data loss prevention, app-to-app protection, and integrated threat protection to monitor cloud app activity, help protect data, and prevent threats. Now, you can easily enable Blumira's Cloud Connector to monitor your cloud app activity using Microsoft Defender for Cloud Apps. This is available to all users, including Free SIEM. See our support article to learn more.
New Parser Integration: Network-attached storage (NAS) provides a centralized location on a network to store data. Synology’s NAS allows users to build a private cloud to store, access, back up, and share files freely and securely. A Synology parser has been released and is available to users with access to sensor integrations (SIEM+ and XDR Platform). Learn more about Blumira sensors.
Rule Clean-Up: If an account stops receiving logs for at least six months, we will remove the detection rules related to those obsolete logs to help clean up the Detection Rules page and make it obvious which rules are still relevant in the account.
Finding Evidence: Finding evidence is now available in one table as it updates, helping users easily find all the data they need and reducing time required to track it down, useful for investigations.
Blumira Agent: We added install key names to the Blumira Agent device list to help you easily identify which install key was used for any specific agent device.
Log Type | Detection Details |
---|---|
Windows or Blumira Agent for Windows |
NEW - Midnight Blizzard Suspicious RDP File Created A detection to find those sneaky Midnight Blizzard IoCs! If you hadn't heard, there have been active campaigns from the Russian threat actor group "Midnight Blizzard" who have been sending targeted phishing campaigns with .rdp files that would expose sensitive information by mapping local resources to a remote server. Default state: Enabled |
Azure Authentication |
NEW - Azure: Potential Token Theft via Entra Device Code Flow This detects when a Microsoft 365 request has been made to retrieve a primary refresh token through a device code flow via the device registration service within Azure. This can be done as a normal part of joining a machine to Entra ID. However, research has shown that this device registration service can be abused, for example, through phishing attempts to gain and maintain access to a user's account. Default state: Enabled |
MS365 Sharepoint |
NEW - MS365 Sharepoint: 500 or More File Deletions in 15 Minutes |
Windows |
NEW - High Number of Windows Group Enumeration Events |
All firewall types |
SMB Connection from Public IP |
CrowdStrike |
CrowdStrike Detections v2 |
Duo Auth |
Duo: High Number of MFA Requests |
Office/Azure Active Directory Audit |
Azure: Entra ID Global Admin Role Assignment & Azure: Entra ID Global Admin Role Assignment by PIM/GDAP |
Office/Azure Active Directory Audit |
Azure AD: Anomalous Agent Sign-In Activity |
Office/Azure Active Directory Audit |
Microsoft 365: MFA Device Registered Without Device Details |
All firewall types |
Internal Reconnaissance - All Connections |
In case you missed the October updates, you can find and review those notes here.