CISO introduces tool that detects hacking in Microsoft Cloud

 

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) introduced an open-source incident response tool called the "Untitled Goose Tool" to detect hacking activity in Microsoft cloud environments.

 The agency developed this tool with Sandia National Laboratories, a research and development laboratory which is part of the United States Department of Energy's National Nuclear Security Administration. 

  • The "Untitled Goose Tool" was created to help network defenders detect malicious activity in Microsoft Azure, Azure Active Directory, and Microsoft 365 environments.
  • Network defenders can leverage the tool's novel authentication and data-gathering methods to interrogate and analyze their Microsoft cloud services. 
  • Users can perform the following tasks with the new tool: 
    • Export and review AAD sign-in and audit logs, M365 unified audit log (UAL), Azure activity logs, Microsoft Defender for IoT (internet of things) alerts, and Microsoft Defender for Endpoint (MDE) data for suspicious activity.
    • Query, export, and investigate AAD, M365, and Azure configurations.
    • Extract cloud artifacts from Microsoft's AAD, Azure, and M365 environments without performing additional analytics. 
    • Perform time bounding of the UAL.
    • Extract data within those time bounds. 
    • Collect and review data using similar time-bounding capabilities for MDE data.

Post a Comment

Previous Next

Contact Form