Azure Active Directory Integration

The CyberCyte portal provide Azure Active Directory integration for more comprehensive visibility. We recommend it for machines without an agent on the domain, accounts with unchanged passwords, locked accounts and analysis of the domain infrastructure.

1. Create MS Azure App

Please log in to the MS Azure Portal and navigate to https://portal.azure.com/#view/Microsoft_AAD_RegisteredApps/ApplicationsListBlade

Register a new applicaiton on a signle tennant with "+ New registration" button. Do not put any URL for endpoint.

2. Get The Client ID & Tenant ID

After the registration, please navigate to "Manage" -> "Certificates & Secrets". Please add a new client secret and copy it.

From the "Overview" menu, please copy the "Application (client) ID" and "Directory (tenant) ID".

Go back to the "Manage" menu and navigate to "API permissions". Add a new permission and select the "Microsoft Graph Permission".

Select the "Applicaiton Permissions".

Select the permissions in the list provided below:

AdministrativeUnit.Read.All

Application

Read all administrative units

Contacts.Read

Delegated

Read user contacts

Contacts.Read

Application

Read contacts in all mailboxes

Contacts.Read.Shared

Delegated

Read user and shared contacts

Directory.Read.All

Delegated

Read directory data

Directory.Read.All

Application

Read directory data

email

Delegated

View users' email address

Group.Read.All

Delegated

Read all groups

Group.Read.All

Application

Read all groups

GroupMember.Read.All

Delegated

Read group memberships

GroupMember.Read.All

Application

Read all group memberships

User.Read

Delegated

Sign in and read user profile

User.Read.All

Delegated

Read all users' full profiles

User.Read.All

Application

Read all users' full profiles

User.ReadBasic.All

Delegated

Read all users' basic profiles

Office 365 Exchange

Contacts.Read

Delegated

Read user contacts

Contacts.Read.All

Delegated

Read user and shared contacts

Contacts.Read.Shared

Delegated

Read user and shared contacts

Group.Read.All

Delegated

Read all groups (preview)

People.Read

Delegated

Read users' relevant people lists (preview)

User.Read

Delegated

Read user profiles

User.Read.All

Delegated

Read all users' full profiles

User.ReadBasic.All

Delegated

Read all users' basic profiles

User.ReadBasic.All

Delegated

Read all users' basic profiles

Grand admin consent after adding the permissions.

3. Create Remote Credential in Portal

Please navigate to "Settings & Reporting" -> "Integration Settings" -> "Credential Settings". Click on the "+ Credential" button to create a new credential. Select the "Microsoft Graph API Credential" as a "Credential Type".

4. Create a Repository on the Portal

Please navigate to "Settings & Reporting" -> "Integration Settings" -> "Repository Management". Click on the "+Repository" button to create a new Azure AD(Active Directory) repository and select the "Azure AD" as Type, and please select the credential that we created in the first step as a "Remote Credential". After that please fill the rest of the blank fields.

5. Create a Policy in the Portal

Please navigate to "Rules & Policies" -> "Policy Management" -> Click on the "+ Policy" button. Please select the module named "Scenario and Network Discovery" and type named "Active Directory Analysis". After the selection, required fields will appeared. Please fill in the blanks with required values. For default values, users can use these values in images below.

The users can assign this policy to their group(s). Also, the collection intervals can be changed to their requirements.

The users can add custom tags by just typing and hitting the enter. The policy will automatically accept the tags.

6. Reviewing the Results

Please navigate to "Home" -> "User Overview" -> "Domain Overview" and "Asset Overview". The "Domain Overview" and "Asset Overview" dashboards provides a great visibility on the active directory and domain information.

Domain Analysis Example Dashboard:

Asset Overview Example Dashboard:

Also, the results can be analyzed from under the "Threat Hunting" -> "Analysis & Investigation" -> "Assets".

After integration, the data obtained must be validated and, if necessary, white-listing or rule definitions must be made. There are already defined rules on CyberCyte, and listing can be done with additional analyses to these rules. Our primary recommendation is to double-check in parallel with the existing solutions in the user's infrastructure.

You can access the relevant findings via dashboards, and you can go to the relevant analysis table by clicking on the data.

When you right-click on any data, you can provide list management under "List Management" from the options that appear on the screen. Similarly, if a special rule needs to be defined, you can create a special rule with the "Rule Management" -> "Add value as a Classification Rule" option and trigger the notification mechanism. The rule management explained in this link https://docs.cloudcyte.com/getting-started/classification-rules.

Last updated

Was this helpful?