Azure user removed from restricted administrative unit

This rule is part of a beta feature. To learn more, contact Support.

Set up the azure integration.

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect removal of Entra ID (Azure AD) users from restricted management Administrative Units (AUs). Restricted AUs prevent any user without a specific scoped role assignment from modifying target users who are members of a restricted management AU. Removal of a user intentionally placed in a restricted management AU can result in a protected user being modifiable by directory-level administrators.

Strategy

Monitor Azure Active Directory logs for @properties.category:AdministrativeUnit and @evt.name:"Remove member from restricted management administrative unit" where the event includes a restricted administrative unit.

Triage and response

  1. Review if restricted administrative units are used by the organization.
  2. Review evidence of anomalous activity for the user being removed from the restricted administrative unit.
  3. Determine if there is a legitimate reason for the user being removed from the restricted administrative unit.
PREVIEWING: mcretzman/DOCS-9337-add-cloud-info-byoti