Potential Illicit Consent Grant attack via Azure registered application
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detects when a user grants an application consent to access their data. An adversary may create an Azure-registered application to access data such as contact information, emails, or documents.
Strategy
Monitor Azure AD Audit logs for the following @evt.name
:
Monitor Microsoft 365 Audit logs for the following @evt.name
:
Because these are thirty-party applications external to the organization, normal remediation steps like resetting passwords for breached accounts or requiring Multi-Factor Authentication (MFA) on accounts are not effective against this type of attack.
Triage and response
- See the official Microsoft playbook on responding to a potential Illicit Consent Grant.
- If the activity is benign:
- Use the linked blog post in the suggested actions panel to tune out false positives.