- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
This month’s releases introduced new detections across Windows, Fortigate, Microsoft 365, and Azure to help uncover persistence, credential compromise, and suspicious network activity. Highlights include new coverage for Guest account enablement, Tactical RMM usage, Protocolhandler abuse, impossible travel, and risky Azure service principal behavior, along with several Fortigate alerts for allowed IPS, anomaly, and virus events. We also improved detection accuracy across multiple existing rules to reduce false positives and better surface meaningful activity.
Detection Updates
| Log Type | Details |
|---|---|
| Azure Directory Audit | NEW - Azure: Service Principal Creation or Modification Followed by Directory Role Assignment Detects when a service principal is created or modified with a client secret and assigned a directory role within a short timeframe. While this can be legitimate activity when adding new app registrations, threat actors have been observed using this technique to gain persistence and elevate privileges in Azure environments. Default state: Enabled |
| Azure Signin |
NEW - Microsoft 365: Suspicious Successful Login - Axios User Agent Detects successful Microsoft 365 sign-ins using the Axios HTTP client library. Axios is a legitimate JavaScript HTTP client that threat actors increasingly abuse in Adversary-in-the-Middle (AitM) phishing campaigns to intercept credentials, MFA tokens, and session tokens in real-time. This user agent pattern is unusual for typical user authentication flows. Default state: Disabled |
| Fortigate Anomaly | NEW - Fortigate: Allowed High/Critical Anomaly Event Detects when a Fortigate device identifies a high or critical severity anomaly event. These events may indicate denial of service attempts, network scanning, or other suspicious network activity that warrants investigation. Default state: Disabled |
| Fortigate IPS |
NEW - Fortigate: Allowed High/Critical IPS Event Detects high or critical severity IPS events on Fortigate devices that were not blocked. This may indicate a misconfigured IPS policy or an attack that bypassed protection and requires immediate investigation. Default state: Enabled |
| Fortigate IPS |
NEW - Fortigate: Allowed Medium IPS Event Detects medium severity IPS events on Fortigate devices that were not blocked. This may indicate a misconfigured IPS policy or an attack that bypassed protection. Default state: Disabled |
| Fortigate Virus |
NEW - Fortigate: Allowed Virus Event Detects when a Fortigate device identifies a virus that was allowed through rather than blocked, indicating a potential antivirus policy misconfiguration. Default state: Disabled |
| Microsoft 365 |
NEW - Microsoft 365: Impossible Travel Detects when Microsoft 365 users exhibit impossible travel behavior within a 3-hour window at 500 MPH or faster. Impossible travel refers to logins or access attempts from different geographic locations within an unrealistically short timeframe, indicating potential credential compromise or malicious activity. This new detection rule differs from our existing “Impossible Travel” rules by calculating travel speed rather than flat distance. Default state: Disabled |
| Windows |
NEW - File Download Using Protocolhandler.EXE Detects the execution of Protocolhandler.EXE spawned by cmd.exe. Attackers abuse this signed Microsoft Office binary to download files from external sources, typically to download tools or malware. This technique allows attackers to bypass certain application allowlisting controls or network restrictions by proxying the download request through a signed Microsoft binary. Default state: Enabled |
| Windows |
NEW - Remote Access Tool: Tactical RMM Detects Tactical RMM activity on endpoints. While commonly used for legitimate remote management by system administrators, attackers have been observed using it as a command-and-control channel. Default state: Enabled |
| Windows |
NEW - Windows Guest Account Enabled Detects when someone enables the built-in Windows Guest account. The Guest account is disabled by default in modern Windows systems and provides a low-privilege access point that does not require a password. Threat actors might enable the account during post-compromise activity to establish persistence, create a backdoor for later access, or facilitate lateral movement within a network. Default state: Enabled |
| Azure Signin |
UPDATE - Azure Entra ID Anomalous Agent Sign-In Activity Added logic to ensure only successful sign-ins are detected. |
| Google Workspaces | UPDATE - Google Workspace External Document Share We updated the detection logic to be more accurate and include additional check to ensure the user is sharing externally. |
| M365 SharePoint |
UPDATE - MS365 SharePoint 100+ File Deletions in 15 Minutes We added logic to handle null file_path and file_name fields to reduce failures and false positives. |
| Traffic | UPDATE - TCP 445 Connection from Public IP We updated the detection logic to filter out connections that are quickly torn down, reducing false positives. |
| Windows | UPDATE - Finger.EXE Execution We broadened the detection logic to surface any finger.EXE execution. Renamed from “Suspicious Invocation of Finger.exe.” |
| Windows | UPDATE - User Created in PowerShell To fix false positives that were being caused by module metadata, we now require command parameters for detection. |
Bug Fixes and Improvements
Bug Fixes
- Resolved Agent Deletion: We fixed an issue that was causing failures when users tried to manually delete a Blumira Agent.
- GCC High Cloud Connector: We fixed an issue that was preventing successful GCC High Cloud Connector integrations.
- MSP Portal Pagination: We fixed a pagination issue in the MSP Portal Accounts table that was causing errors in rendering whenever users selected 250.
- Executive Summary Report Access: We fixed an issue that was preventing Respond and Automate customers from getting Executive Summary reports.
Improvements
- Log Parsing Expansion: We’re now parsing additional fields from Azure General logs and pfSense logs.
December 2025 Release Notes
In case you missed the November updates, you can find and review those notes here.
Eric Pitt
Eric is a Product Marketing Manager at Blumira focusing on customer research and positioning to continuously improve the Blumira platform.
More from the blog
View All PostsSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.