Azure administrative unit modified

This rule is part of a beta feature. To learn more, contact Support.

Set up the azure integration.

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detects the modification of Entra ID (Azure AD) Administrative Units (AUs). The modification of AUs may indicate suspicious activity if an environment is not utilizing AUs.

Strategy

Monitor Azure Active Directory logs for @properties.category:AdministrativeUnit and (@evt.name:"Update administrative unit" OR @evt.name:"Restore administrative unit" OR @evt.name:"Delete administrative unit" OR @evt.name:"Hard delete administrative unit") where the event is not a restricted administrative unit.

Triage and response

  1. Review if administrative units are used by the organization.
  2. Review evidence of anomalous activity for the user modifying an administrative unit.
  3. Determine if there is a legitimate reason for the user modifying an administrative unit.
PREVIEWING: mcretzman/DOCS-9337-add-cloud-info-byoti