Azure AD Privileged Identity Management member assigned

Set up the azure integration.

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect whenever a user assigns an administrative role in Azure Privileged Identity Management (PIM).

Strategy

Monitor Azure Active Directory and generate a signal when a user assigns an administrative role to a PIM member.

The field @usr.id is the user that actioned the change, and the field @properties.targetResources.userPrincipalName is the user being assigned the administrative privileges.

Triage and response

  1. Determine if {{@usr.id}} should have assigned the administrative role.
  2. If the API call was not made by the user:
  • Rotate user credentials.
  • Determine what other API calls were made by the user.
  • Begin your organization’s incident response (IR) process and investigate.
  1. If the API call was made legitimately:
  • Determine if {{@usr.id}} was authorized to make the change.
  • Follow Microsoft’s best practices where possible to ensure the user was assigned the correct level of privileges for their function.

Changelog

  • 19 December 2023 - Updated group by values to include @properties.targetResources.userPrincipalName
PREVIEWING: esther/docs-9478-fix-split-after-example