LoFP
/
google_workspace
google_workspace rule
Title
Tags
a user may generate a shared access link to encryption key files to share with others. it is unlikely that the intended recipient is an external or anonymous user.
t1552
google_workspace
elastic
administrators may add external users to groups to share files and communication with them via the intended recipient be the group they are added to. it is unlikely an external user account would be added to an organization's group where administrators should create a new user account.
t1078
google_workspace
elastic
administrators may create custom email routes in google workspace based on organizational policies, administrative preference or for security purposes regarding spam.
t1114
google_workspace
elastic
administrators may remove 2-step verification (2sv) temporarily for testing or during maintenance. if 2sv was previously enabled, it is not common to disable this policy for extended periods of time.
t1556
google_workspace
elastic
administrators may temporarily disabled bitlocker on managed devices for maintenance, testing or to resolve potential endpoint conflicts.
t1562
google_workspace
elastic
administrators may transfer file ownership during employee leave or absence to ensure continued operations by a new or existing employee.
t1074
google_workspace
elastic
applications can be added and removed from blocklists by google workspace administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
t1562
google_workspace
elastic
applications can be added to a google workspace domain by system administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
google_workspace
elastic
custom google workspace admin roles may be created by system administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
t1098
google_workspace
elastic
developers may leverage third-party applications for legitimate purposes in google workspace such as for administrative tasks.
t1078
t1550
google_workspace
elastic
domain-wide delegation of authority may be granted to service accounts by system administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
t1098
google_workspace
elastic
for additional tuning, severity exceptions for google_workspace.alert.metadata.severity can be added.
google_workspace
elastic
google workspace admin role assignments may be modified by system administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
t1098
google_workspace
elastic
google workspace admin roles may be deleted by system administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
t1531
google_workspace
elastic
google workspace admin roles may be modified by system administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
t1098
google_workspace
elastic
google workspace administrators may adjust change which organizational unit a user belongs to as a result of internal role adjustments.
t1098
google_workspace
elastic
google workspace administrators may renew a suspended user account if the user is expected to continue employment at the organization after temporary leave. suspended user accounts are typically used by administrators to remove access to the user while actions is taken to transfer important documents and roles to other users, prior to deleting the user account and removing the license.
t1078
google_workspace
elastic
google workspace users typically share drive resources with a shareable link where parameters are edited to indicate when it is viewable or editable by the intended recipient. it is uncommon for a user in an organization to manually copy a drive object from an external drive to their corporate drive. this may happen where users find a useful spreadsheet in a public drive, for example, and replicate it to their drive. it is uncommon for the copied object to execute a container-bound script either unless the user was intentionally aware, suggesting the object uses container-bound scripts to accomplish a legitimate task.
t1566
google_workspace
elastic
mfa policies may be modified by system administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
t1531
google_workspace
elastic
mfa settings may be modified by system administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
t1556
google_workspace
elastic
password policies may be modified by system administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
t1098
google_workspace
elastic
to tune this rule, add exceptions to exclude any google_workspace.alert.type which should not trigger this rule.
google_workspace
elastic
trusted domains may be added by system administrators. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
t1562
google_workspace
elastic