I used your sample rule and it shows up in phase 3, however I can't seem to search these events, they are not appearing in
Wazuh > Modules > Security Events > Events when I search for them.
Any ideas why?
Here is how they appear in /var/ossec/logs/archives/archives.log
{"win":{"system":{"providerName":"Microsoft-AzureADPasswordProtection-DCAgent","providerGuid":"{fce041b2-eacd-48a2-8e09-4d5d43c0ff69}","eventID":"30002","version":"0","level":"4","task":"0","opcode":"0","keywords":"0x8000000000000000","systemTime":"2023-10-11T04:24:18.8688596Z","eventRecordID":"17812","processID":"3036","threadID":"5720","channel":"Microsoft-AzureADPasswordProtection-DCAgent/Admin","computer":"XXXXX","severityValue":"INFORMATION","message":"\"The
changed password for the specified user was rejected because it matched at least one of the tokens present in the per-tenant banned password list of the current Azure password policy.\r\n \r\n UserName: spare\r\n FullName: Spare Account\r\n\""},"eventdata":{"data1":"spare","data2":"Spare
Account"}}}
{"win":{"system":{"providerName":"Microsoft-AzureADPasswordProtection-DCAgent","providerGuid":"{fce041b2-eacd-48a2-8e09-4d5d43c0ff69}","eventID":"10016","version":"0","level":"4","task":"0","opcode":"0","keywords":"0x8000000000000000","systemTime":"2023-10-11T04:24:18.8688864Z","eventRecordID":"17813","processID":"840","threadID":"2844","channel":"Microsoft-AzureADPasswordProtection-DCAgent/Admin","computer":"XXXXX","severityValue":"INFORMATION","message":"\"The
changed password for the specified user was rejected because it did not comply with the current Azure password policy. Please see the correlated event log message for more details.\r\n \r\n UserName: spare\r\n FullName: Spare Account\r\n\""},"eventdata":{"data1":"spare","data2":"Spare
Account"}}}
Here is the output of the rule test.
**Messages:
WARNING: (7003): '9c420834' token expires
INFO: (7202): Session initialized with token '147ddfcc'
**Phase 1: Completed pre-decoding.
full event: '{"win":{"system":{"providerName":"Microsoft-AzureADPasswordProtection-DCAgent","providerGuid":"{fce041b2-eacd-48a2-8e09-4d5d43c0ff69}","eventID":"30002","version":"0","level":"4","task":"0","opcode":"0","keywords":"0x8000000000000000","systemTime":"2023-10-11T04:24:18.8688596Z","eventRecordID":"17812","processID":"3036","threadID":"5720","channel":"Microsoft-AzureADPasswordProtection-DCAgent/Admin","computer":"VAN-DC02.vand1.oppy.com","severityValue":"INFORMATION","message":"\"The
changed password for the specified user was rejected because it matched at least one of the tokens present in the per-tenant banned password list of the current Azure password policy.\r\n \r\n UserName: spare\r\n FullName: Spare Account\r\n\""},"eventdata":{"data1":"spare","data2":"Spare
Account"}}}'
**Phase 2: Completed decoding.
name: 'json'
win.eventdata.data1: 'spare'
win.eventdata.data2: 'Spare Account'
win.system.channel: 'Microsoft-AzureADPasswordProtection-DCAgent/Admin'
win.system.computer: 'XXXXX'
win.system.eventID: '30002'
win.system.eventRecordID: '17812'
win.system.keywords: '0x8000000000000000'
win.system.level: '4'
win.system.message: '"The changed password for the specified user was rejected because it matched at least one of the tokens present in the per-tenant
banned password list of the current Azure password policy.
UserName: spare
FullName: Spare Account
"'
win.system.opcode: '0'
win.system.processID: '3036'
win.system.providerGuid: '{fce041b2-eacd-48a2-8e09-4d5d43c0ff69}'
win.system.providerName: 'Microsoft-AzureADPasswordProtection-DCAgent'
win.system.severityValue: 'INFORMATION'
win.system.systemTime: '2023-10-11T04:24:18.8688596Z'
win.system.task: '0'
win.system.threadID: '5720'
win.system.version: '0'