Forum Discussion
DefenderAdmin
Nov 30, 2022Brass Contributor
Honeytoken alerts FP
Hi!
We do have a lot of "Honeytoken activity" since 23.11.2022 starting in the evening (MET timezone).
Normally, in the past this kind of alert only appeared during planed penetration tests and the alert was accurate. But right now, we do have honeytoken activity from around 185 sources (clients) with sam-r queries so far, counting!
It seems to be a bug and we will wait for the next releases from Defender for Identity, so far we couldn't find a cause which makes sense that this alert keeps being triggered... (meaning no signs of a real attack, no idea what update or other config changes could have started this behaviour)
Maybe someone else experiences the same right now, this is meant as an information...
BR
- Saicharan_NagapuriCopper Contributor
Can we ignore below alerts as we are receiving a greater number of alerts on daily basis?
Alert name Count Honeytoken was queried via SAM-R 258 Honeytoken was queried via LDAP 217 Honeytoken authentication activity 20 - Daniel Naim
Microsoft
Wouldn't it be easier to exclude the host devices that performed this activity as its benign? Then you don't lose the functionality when it's performed from an abnormal source.
- Saicharan_NagapuriCopper ContributorHi Daniel, Could you please share the playbook for the below honey token alert? Like When to consider alert as FP and on what basis do we need to exclude the host's devices?
- DefenderAdminBrass ContributorJust for your information, for all of them who it may concern:
"We're in the process of disabling the SAM-R honeytoken alert. While these types of accounts should never be accessed or queried, we're aware that certain legacy systems may use these accounts as part of their regular operations. If this functionality is necessary for you, you can always create an advanced hunting query and use it as a custom detection. Additionally, we'll be reviewing the LDAP honeytoken alert over the coming weeks, but it will remain functional for now."
Source:
https://learn.microsoft.com/en-us/defender-for-identity/whats-new#defender-for-identity-release-2201 - DefenderAdminBrass ContributorJust to give anybody an update on this:
This weekend, the security portal started to create alerts for the honeytoken activity; this is kind of new because recently, those alerts were only shown within the "old" Defender for Identity portal and also the MCAS alert overview.
Long story short:
As i didn't find a solution for our scenario yet, i "deleted" the honeytoken user from the MDI honeytoken settings. Not useful any longer 😞- Daniel Naim
Microsoft
DefenderAdmin version 1.98 should fix it. Do you have it deployed already? Please see the what's new page for the info.
- DefenderAdminBrass ContributorYes, we are using 2.198.16173.18440 which should be the most recent version.
I've seen in the release notes that there are now several alert conditions and the one which got triggered A LOT is "Honeytoken user was queried via SAM-R"
I will give it another shot and maybe if i can whitelist or ignore the SAM-R events at least all other events are "useful" again.
- Jacampbell
Microsoft
- DefenderAdminBrass Contributor@Jacampbell: nope, it is still happening even after the latest agent updates. Do you see that issue by yourself as well?
- Jacampbell
Microsoft
DefenderAdmin I am working on a case with similar symptoms. Have you opened a support ticket for this?
- Alexander BunkCopper ContributorWe have the same experience. Any updates on this?
- Jacampbell
Microsoft
Hey - have you opened a support ticket- DefenderAdminBrass Contributorno, i didn't open a support ticket yet. i was hoping that an agent update will solve the issue, which didn't happened yet. But to be honest, i don't have the time or nerve right now for handling a Microsoft ticket case with some indian MS supporter...