SaaS suspicious external domain user activity

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2024-10-08
Category
Analytics Alert Reference
Order
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires one of the following data sources:
    • Google Workspace Audit Logs
      OR
    • Office 365 Audit

Detection Modules

Identity Threat Module

Detector Tags

ATT&CK Tactic

Initial Access (TA0001)

ATT&CK Technique

External Remote Services (T1133)

Severity

Informational

Description

An operation was performed by an identity. This identity belongs to a domain that was not seen in the organization before.

Attacker's Goals

Gain their initial foothold within the organization and explore the environment to achieve their target.

Investigative actions

  • investigate the external domain name.
  • Check the identity activity in the organization.

Variations

Suspicious external user activity detected from a domain first seen in the organization

Synopsis

ATT&CK Tactic

Initial Access (TA0001)

ATT&CK Technique

External Remote Services (T1133)

Severity

Low

Description

An operation was performed by an identity. This identity belongs to a domain that was not seen in the organization, both in cloud and SaaS environments.

Attacker's Goals

Gain their initial foothold within the organization and explore the environment to achieve their target.

Investigative actions

  • investigate the external domain name.
  • Check the identity activity in the organization.