-
-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New Google Workspace rules #5409
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
added newline
Added an aditional 2 gworkspace rules.
Not to come across as rushed, but what is actually the usual time from the time of opening a pull request to the final merge? Thanks in advance! |
It depends on the workload. It's simply best effort. |
Thanks for the response and your dedication as admins for Sigma! |
Please have a look at other |
My bad, thanks! |
I don't see the |
rules/cloud/gcp/gworkspace/gcp_gworkspace_out_of_domain_email_forwarding.yml
Outdated
Show resolved
Hide resolved
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
…forwarding.yml Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
I definitely tested the rules. Thanks for the recommendations. For completeness, I have put down a sample log of the “email forwarding” rule below.
|
Summary of the Pull Request
Adds a new Sigma rule that detects suspicious login activity within Google Workspace environments as classified by Google. The rule matches on specific eventName values (suspicious_login, suspicious_login_less_secure_app, and suspicious_programmatic_login) recorded in the login.googleapis.com service.
These log events indicate potentially malicious or unusual login attempts, such as from less secure apps, programmatic access, or abnormal login behavior. The rule supports detection of possible Initial Access techniques, specifically aligning with MITRE ATT&CK technique T1078 (Valid Accounts).
Changelog
new: Google Workspace Government Attack Warning
new: Google Workspace Out Of Domain Email Forwarding
new: Suspicious Login Activity Classified By Google
Example Log Event
Fixed Issues
SigmaHQ Rule Creation Conventions