Skip to content

Latest commit

 

History

History
36 lines (29 loc) · 1.63 KB

OffboardingPackageDownloaded.md

File metadata and controls

36 lines (29 loc) · 1.63 KB

Defender For Endpoint Offboarding Package Downloaded

Query Information

MITRE ATT&CK Technique(s)

Technique ID Title Link
T1562.001 Impair Defenses: Disable or Modify Tools https://attack.mitre.org/techniques/T1562/001/

Description

This query lists when a Defender For Endpoint offboarding package has been downloaded. Defender For Endpoint offboarding packages are considered tier0, because this allows you to remove security tooling from devices. (Local) Administrator permissions are needed to execute the proces and successfully ofboard devices.

Risk

An actor has gotten access to an account that is able to download an Defender For Endpoint offboarding package and offboard devices, reducing visability.

References

Defender XDR

CloudAppEvents
| where ActionType == "DownloadOffboardingPkg"
| extend UserId = tostring(parse_json(RawEventData).UserId), ClientIP = tostring(parse_json(RawEventData).ClientIP)
| project-rename InitiatedByAccountName = AccountDisplayName, InitiatedByAccounttId = AccountId
| project-reorder Timestamp, InitiatedByAccountName, UserId, ClientIP, ActionType

Sentinel

CloudAppEvents
| where ActionType == "DownloadOffboardingPkg"
| extend UserId = tostring(parse_json(RawEventData).UserId), ClientIP = tostring(parse_json(RawEventData).ClientIP)
| project-rename InitiatedByAccountName = AccountDisplayName, InitiatedByAccounttId = AccountId
| project-reorder TimeGenerated, InitiatedByAccountName, UserId, ClientIP, ActionType