Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[google_workspace] Missing extra filters for Successful Logins by Compromised Users panel #8745

Open
ebeahan opened this issue Dec 18, 2023 · 8 comments · May be fixed by #12628
Open

[google_workspace] Missing extra filters for Successful Logins by Compromised Users panel #8745

ebeahan opened this issue Dec 18, 2023 · 8 comments · May be fixed by #12628
Assignees
Labels
bug Something isn't working, use only for issues dashboard Relates to a Kibana dashboard bug, enhancement, or modification. Integration:google_workspace Google Workspace Team:Security-Service Integrations Security Service Integrations Team [elastic/security-service-integrations]

Comments

@ebeahan
Copy link
Member

ebeahan commented Dec 18, 2023

For the login data stream. the [Logs Google Workspace] Login dashboard (source) contains two panels using the same filters:

  • Total Successful Login [Logs Google Workspace]
  • Successful Logins by Compromised Users [Logs Google Workspace]

Filter: data_stream.dataset: "google_workspace.login" AND "event_action: "login_success"

The Compromised Users panel shows all successful logins and is missing additional filters to limit only to compromised accounts.

@ebeahan ebeahan added bug Something isn't working, use only for issues Team:Security-External Integrations Integration:google_workspace Google Workspace labels Dec 18, 2023
@elasticmachine
Copy link

Pinging @elastic/security-external-integrations (Team:Security-External Integrations)

@narph narph added Team:Security-Service Integrations Security Service Integrations Team [elastic/security-service-integrations] and removed Team:Security-External Integrations labels Jan 25, 2024
@narph narph added the dashboard Relates to a Kibana dashboard bug, enhancement, or modification. label Aug 29, 2024
@StacieClark-Elastic
Copy link
Member

@ebeahan to clarify. We have events for suspending users. We have events to identify compromised devices. This ticket appears to be asking for a filter that:
For the time range of successful logins (t1-t2), filter the login list by users who were suspended after t1. If the user was later unsuspended, still filter by the user.

@StacieClark-Elastic
Copy link
Member

@marc-gr mentioned that there is a is_suspicious flag on logins. Perhaps filtering by this flag is what the goal is?

@ebeahan
Copy link
Member Author

ebeahan commented Jan 29, 2025

@StacieClark-Elastic I don't recall what exactly prompted me to open this one. 😅

IIRC the two visualizations show the same information because the filter is the same. I expect the Compromised User visualization to have an additional filter. Maybe that's the is_suspicious flag @marc-gr mentioned.

Unfortunately, I don't have an environment with Google Workspace data to show an example for reference right now.

@StacieClark-Elastic
Copy link
Member

From this page: https://support.google.com/a/answer/7102416?hl=en
Examples of suspicious logins A user doesn't follow their usual sign-in pattern, such as a signing in from an unusual location. **There was a successful sign-in from a suspended user's account.** Note: You might also get an alert if a suspicious event occurs when a user is using Mail Fetcher to import mail from another Gmail account, because the messages are being fetched through Google servers.

Given that we don't have a company wide definition of what a "Compromised User" is, we could change the visualization title to "Suspicious Logins" or "Logins that are Suspicious" and add the filter for the is_suspicious flag

@ebeahan
Copy link
Member Author

ebeahan commented Jan 30, 2025

Given that we don't have a company wide definition of what a "Compromised User" is, we could change the visualization title to "Suspicious Logins" or "Logins that are Suspicious" and add the filter for the is_suspicious flag

I think that's reasonable. A login being flagged as suspicious doesn't mean it's compromised.

@StacieClark-Elastic
Copy link
Member

further investigation uncovered another type of login event which is a device login event. There is a flag called is_compromised on device logins. So this MAY show a successful login on a device that is compromised

@StacieClark-Elastic
Copy link
Member

Date | 2025-01-30T15:14:20-05:00
Device ID | device_id
Event | Account registration change
Description | user@domain account registered on  with device administrator privilege
User email | user@domain
Device type | Android
Device model |  
OS version |  
Policy name |  
Policy status code |  
Policy status |  
Windows OS edition |  
Failed password attempts | 0
Device compromised state |  
Device property |  
Device setting |  
Application SHA-256 hash |  
Application ID |  
Application state |  
New value |  
Old value |  
Account state | Registered
Register privilege | Device administrator
Device ownership |  
New device ID |  
Resource ID |
Serial number |  
iOS vendor ID |  
Domain |
Device compliance state |  
OS property |  
OS is outdated |  
Security patch is outdated |  
Has potentially harmful apps |  
Is compromised |  


Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working, use only for issues dashboard Relates to a Kibana dashboard bug, enhancement, or modification. Integration:google_workspace Google Workspace Team:Security-Service Integrations Security Service Integrations Team [elastic/security-service-integrations]
Projects
None yet
4 participants