<  Back to rules search

Azure Network Security Groups or Rules Created, Modified, or Deleted

azure

Classification:

attack

Tactic:

Technique:

Set up the azure integration.

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when an Azure network security group or an Azure network security rule has been created, modified, or deleted.

Strategy

Monitor Azure activity logs and detect when the @evt.name is equal to any one of the following names:

  • MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/WRITE
  • MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/DELETE
  • MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/SECURITYRULES/WRITE
  • MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/SECURITYRULES/DELETE

and @evt.outcome is equal to Success.

Triage and response

  1. Inspect the security group or security rule and determine if it exposes any Azure resources that should not be exposed.