Skip to content

Commit 4aaf30c

Browse files
authored
Merge pull request #11727 from Azure/v-prasadboke-entraid
Added new Analytic rule to the Solution 'AzureRBAC'
2 parents 4f3b47e + 84221ee commit 4aaf30c

File tree

6 files changed

+1816
-1605
lines changed

6 files changed

+1816
-1605
lines changed
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
id: 132fdff4-c044-4855-a390-c1b71e0f833b
2+
name: Azure RBAC (Elevate Access)
3+
kind: Scheduled
4+
description: |
5+
'Detects when a Global Administrator elevates access to all subscriptions and management groups in a tenant. When a Global Administrator elevates access they are assigned the User Access Administrator role at root scope. This Microsoft Sentinel Analytic Rule monitors who has elevated access in your tenant so that admins can take appropriate action. [Learn more](https://learn.microsoft.com/en-us/azure/role-based-access-control/elevate-access-global-admin?tabs=azure-portal)'
6+
severity: High
7+
requiredDataConnectors:
8+
- connectorId: AzureActiveDirectory
9+
dataTypes:
10+
- AuditLogs
11+
queryFrequency: 2h
12+
queryPeriod: 2h
13+
triggerOperator: GreaterThan
14+
triggerThreshold: 0
15+
tactics:
16+
- PrivilegeEscalation
17+
relevantTechniques:
18+
- T1078
19+
enabled: true
20+
query: |
21+
AuditLogs
22+
| where Category =~ "AzureRBACRoleManagementElevateAccess"
23+
| where ActivityDisplayName =~ "User has elevated their access to User Access Administrator for their Azure Resources"
24+
| extend Actor = tostring(InitiatedBy.user.userPrincipalName)
25+
| extend IPAddress = tostring(InitiatedBy.user.ipAddress)
26+
| project
27+
TimeGenerated,
28+
Actor,
29+
OperationName,
30+
IPAddress,
31+
Result,
32+
LoggedByService
33+
entityMappings:
34+
- entityType: Account
35+
fieldMappings:
36+
- identifier: Name
37+
columnName: Actor
38+
- entityType: IP
39+
fieldMappings:
40+
- identifier: Address
41+
columnName: IPAddress
42+
suppressionDuration: PT5H
43+
suppressionEnabled: false
44+
alertRuleTemplateName: null
45+
incidentConfiguration:
46+
createIncident: true
47+
groupingConfiguration:
48+
enabled: false
49+
reopenClosedIncident: false
50+
lookbackDuration: PT5H
51+
matchingMethod: AllEntities
52+
groupByEntities: []
53+
groupByAlertDetails: []
54+
groupByCustomDetails: []
55+
eventGroupingSettings:
56+
aggregationKind: SingleAlert
57+
version: 1.0.0
58+

Solutions/Microsoft Entra ID/Data/Solution_AAD.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,8 @@
7373
"Solutions/Microsoft Entra ID/Analytic Rules/UserAccounts-CABlockedSigninSpikes.yaml",
7474
"Solutions/Microsoft Entra ID/Analytic Rules/UseraddedtoPrivilgedGroups.yaml",
7575
"Solutions/Microsoft Entra ID/Analytic Rules/UserAssignedNewPrivilegedRole.yaml",
76-
"Solutions/Microsoft Entra ID/Analytic Rules/UserAssignedPrivilegedRole.yaml"
76+
"Solutions/Microsoft Entra ID/Analytic Rules/UserAssignedPrivilegedRole.yaml",
77+
"Solutions/Microsoft Entra ID/Analytic Rules/AzureRBAC.yaml"
7778

7879
],
7980
"Playbooks": [
@@ -90,7 +91,7 @@
9091
"Solutions/Microsoft Entra ID/Playbooks/Revoke-AADSignInSessions/entity-trigger/azuredeploy.json"
9192
],
9293
"BasePath": "C:\\GitHub\\Azure-Sentinel",
93-
"Version": "3.2.10",
94+
"Version": "3.3.0",
9495
"Metadata": "SolutionMetadata.json",
9596
"TemplateSpec": true,
9697
"StaticDataConnectorIds": [
94.2 KB
Binary file not shown.

Solutions/Microsoft Entra ID/Package/createUiDefinition.json

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
"config": {
77
"isWizard": false,
88
"basics": {
9-
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Workbooks/Images/Logos/MicrosoftEntraID_logo.svg\"width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Microsoft%20Entra%20ID/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Microsoft Entra ID](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis) solution for Microsoft Sentinel enables you to ingest Microsoft Entra ID [Audit](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-audit-logs), [Sign-in](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-sign-ins), [Provisioning](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-provisioning-logs), [Risk Events and Risky User/Service Principal](https://docs.microsoft.com/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk#risky-users) logs using Diagnostic Settings into Microsoft Sentinel.\n\n**Data Connectors:** 1, **Workbooks:** 2, **Analytic Rules:** 63, **Playbooks:** 11\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
9+
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Workbooks/Images/Logos/MicrosoftEntraID_logo.svg\"width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Microsoft%20Entra%20ID/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Microsoft Entra ID](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis) solution for Microsoft Sentinel enables you to ingest Microsoft Entra ID [Audit](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-audit-logs), [Sign-in](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-sign-ins), [Provisioning](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-provisioning-logs), [Risk Events and Risky User/Service Principal](https://docs.microsoft.com/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk#risky-users) logs using Diagnostic Settings into Microsoft Sentinel.\n\n**Data Connectors:** 1, **Workbooks:** 2, **Analytic Rules:** 64, **Playbooks:** 11\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
1010
"subscription": {
1111
"resourceProviders": [
1212
"Microsoft.OperationsManagement/solutions",
@@ -1038,6 +1038,20 @@
10381038
}
10391039
}
10401040
]
1041+
},
1042+
{
1043+
"name": "analytic64",
1044+
"type": "Microsoft.Common.Section",
1045+
"label": "Azure RBAC (Elevate Access)",
1046+
"elements": [
1047+
{
1048+
"name": "analytic64-text",
1049+
"type": "Microsoft.Common.TextBlock",
1050+
"options": {
1051+
"text": "Detects when a Global Administrator elevates access to all subscriptions and management groups in a tenant. When a Global Administrator elevates access they are assigned the User Access Administrator role at root scope. This Microsoft Sentinel Analytic Rule monitors who has elevated access in your tenant so that admins can take appropriate action. [Learn more](https://learn.microsoft.com/en-us/azure/role-based-access-control/elevate-access-global-admin?tabs=azure-portal)"
1052+
}
1053+
}
1054+
]
10411055
}
10421056
]
10431057
},

0 commit comments

Comments
 (0)