CISA releases open source Untitled Goose Tool to detect malicious activity in Azure, Azure Active Directory and Microsoft 365 environments

CISA logo and goose

The CISA has launched a new security tool designed to help protect various Microsoft cloud services. The open source Untitled Goose Tool is available for both Windows and macOS.

The utility was developed by the US Cybersecurity & Infrastructure Security Agency in conjunction with Sandia National Laboratories. The aim of the tool is to help to detect and respond to malicious activity in Microsoft Azure, Azure Active Directory (AAD) and Microsoft 365 (M365) environments.

See also:

Announcing the availability of the utility, the security agency says: "Today, CISA released the Untitled Goose Tool to help network defenders detect potentially malicious activity in Microsoft Azure, Azure Active Directory (AAD), and Microsoft 365 (M365) environments. The Untitled Goose Tool offers novel authentication and data gathering methods for network defenders to use as they interrogate and analyze their Microsoft cloud services".

Over on the Untitled Goose Tool GitHub repository, the security utility is described as follows:

Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments. Untitled Goose Tool gathers additional telemetry from Microsoft Defender for Endpoint (MDE) and Defender for Internet of Things (IoT) (D4IoT).

The CISA says that the tools can be used by network defenders to:

  • Export and review AAD sign-in and audit logs, M365 unified audit log (UAL), Azure activity logs, Microsoft Defender for IoT (internet of things) alerts, and Microsoft Defender for Endpoint (MDE) data for suspicious activity
  • Query, export, and investigate AAD, M365, and Azure configurations
  • Extract cloud artifacts from Microsoft’s AAD, Azure, and M365 environments without performing additional analytics
  • Perform time bounding of the UAL via goosey graze
  • Extract data within those time bounds with goosey honk
  • Interrogate and collect data using similar time bounding capabilities for MDE data

More information is available in the Untitled Goose Tool fact sheet.

Image credit: Gelpi / depositphotos

One Response to CISA releases open source Untitled Goose Tool to detect malicious activity in Azure, Azure Active Directory and Microsoft 365 environments

  1. Pingback: CISA releases open source Untitled Goose Tool to detect malicious activity in Azure, Azure Active Directory and Microsoft 365 environments – NEUS CORP

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.