- 重要な情報
- はじめに
- 用語集
- ガイド
- エージェント
- インテグレーション
- OpenTelemetry
- 開発者
- API
- CoScreen
- アプリ内
- Service Management
- インフラストラクチャー
- アプリケーションパフォーマンス
- 継続的インテグレーション
- ログ管理
- セキュリティ
- UX モニタリング
- 管理
Set up the azure integration.
Detect an Azure Active Directory (Azure AD) member being added to a built-in Administrative role.
Monitor Azure AD Audit logs for the following operations:
@evt.name:"Add member to role"
@properties.targetResources.modifiedProperties.newValue:*Administrator*
Azure AD uses roles to assign privileges to users. There are over 80 roles available, the list below details some of the highest privileged roles that adversaries could target:
This whitepaper from Mandiant describes the abuse of Azure AD privileged roles.
The field @usr.id
is the user that actioned the change, and the field @properties.targetResources.userPrincipalName
is the user being assigned the administrative privileges.
{{@usr.id}}
should have made a {{@evt.name}}
API call.{{@usr.id}}
was authorized to make the change.@properties.targetResources.userPrincipalName