This rule is part of a beta feature. To learn more, contact Support.

Set up the azure integration.

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detects the creation of Entra ID (Azure AD) Administrative Units (AUs). The use of this type of this policy may indicate suspicious activity if an environment is not utilizing AUs.

Strategy

Monitor Azure Active Directory logs for @properties.category:AdministrativeUnit and @evt.name: "Add administrative unit" where the event is not a restricted administrative unit.

Triage and response

  1. Review if administrative units are used by the organization.
  2. Review evidence of anomalous activity for the user creating an administrative unit.
  3. Determine if there is a legitimate reason for the user creating an administrative unit.
PREVIEWING: Cyril-Bouchiat/add-vm-package-explorer-doc