Techniques
Sample rules
BloodHound Suite User-Agents Detected
- source: elastic
- technicques:
- T1069
- T1082
- T1087
- T1201
- T1526
- T1580
- T1673
Description
Identifies potential enumeration activity using AzureHound, SharpHound, or BloodHound across Microsoft cloud services. These tools are often used by red teamers and adversaries to map users, groups, roles, applications, and access relationships within Microsoft Entra ID (Azure AD) and Microsoft 365.
Detection logic
any where event.dataset : (
"azure.activitylogs",
"azure.graphactivitylogs",
"azure.auditlogs",
"azure.signinlogs",
"o365.audit"
) and user_agent.original regex~ "(azure|sharp|blood)(hound)/.*"