You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/security-operations-consumer-accounts.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,6 +57,8 @@ Use log files to investigate and monitor. See the following articles for more:
57
57
*[Sign-in logs in Azure AD (preview)](../reports-monitoring/concept-all-sign-ins.md)
58
58
*[How To: Investigate risk](../identity-protection/howto-identity-protection-investigate-risk.md)
59
59
60
+
### Audit logs and automation tools
61
+
60
62
From the Azure portal, you can view Azure AD Audit logs and download as comma separated value (CSV) or JavaScript Object Notation (JSON) files. Use the Azure portal to integrate Azure AD logs with other tools to automate monitoring and alerting:
61
63
62
64
***Microsoft Sentinel** – security analytics with security information and event management (SIEM) capabilities
@@ -77,7 +79,7 @@ Use the remainder of the article for recommendations on what to monitor and aler
77
79
78
80
## Consumer accounts
79
81
80
-
| What to monitor | Risk Level| Where | Filter / subfilter | Notes |
82
+
| What to monitor | Risk level| Where | Filter / subfilter | Notes |
81
83
| - | - | - | - | - |
82
84
| Large number of account creations or deletions | High | Azure AD Audit logs | Activity: Add user<br>Status = success<br>Initiated by (actor) = CPIM Service<br>-and-<br>Activity: Delete user<br>Status = success<br>Initiated by (actor) = CPIM Service | Define a baseline threshold, and then monitor and adjust to suite your organizational behaviors. Limit false alerts. |
83
85
| Accounts created and deleted by non-approved users or processes| Medium | Azure AD Audit logs | Initiated by (actor) – USER PRINCIPAL NAME<br>-and-<br>Activity: Add user<br>Status = success<br>Initiated by (actor) != CPIM Service<br>and-or<br>Activity: Delete user<br>Status = success<br>Initiated by (actor) != CPIM Service | If the actors are non-approved users, configure to send an alert. |
@@ -91,7 +93,7 @@ Use the remainder of the article for recommendations on what to monitor and aler
91
93
92
94
## Privileged accounts
93
95
94
-
| What to monitor | Risk Level| Where | Filter/sub-filter | Notes |
96
+
| What to monitor | Risk level| Where | Filter / sub-filter | Notes |
95
97
| - | - | - | - | - |
96
98
| Sign-in failure, bad password threshold | High | Azure AD Sign-ins log | Status = Failure<br>-and-<br>error code = 50126 | Define a baseline threshold and monitor and adjust to suit your organizational behaviors. Limit false alerts. |
97
99
| Failure because of Conditional Access requirement | High | Azure AD Sign-ins log | Status = Failure<br>-and-<br>error code = 53003<br>-and-<br>Failure reason = Blocked by Conditional Access | This event can indicate an attacker is trying to get into the account. |
@@ -109,7 +111,7 @@ Identity Provider deleted by non-approved actors | High | Azure AD Access Review
109
111
110
112
## Applications
111
113
112
-
| What to monitor | Risk Level| Where | Filter/sub-filter | Notes |
114
+
| What to monitor | Risk level| Where | Filter / sub-filter | Notes |
113
115
| - | - | - | - | - |
114
116
| Added credentials to applications | High | Azure AD Audit logs | Service-Core Directory, Category-ApplicationManagement<br>Activity: Update Application-Certificates and secrets management<br>-and-<br>Activity: Update Service principal/Update Application | Alert when credentials are: added outside normal business hours or workflows, types not used in your environment, or added to a non-SAML flow supporting service principal. |
115
117
| App assigned to an Azure role-based access control (RBAC) role, or Azure AD Role | High to medium | Azure AD Audit logs | Type: service principal<br>Activity: “Add member to role”<br>or<br>“Add eligible member to role”<br>-or-<br>“Add scoped member to role.” |N/A|
0 commit comments