@@ -7,7 +7,7 @@ manager: amycolannino
7
7
ms.service : role-based-access-control
8
8
ms.topic : how-to
9
9
ms.workload : identity
10
- ms.date : 07/29 /2022
10
+ ms.date : 10/30 /2022
11
11
ms.author : rolyon
12
12
---
13
13
@@ -49,19 +49,19 @@ To get notified of privileged role assignments, you create an alert rule in Azur
49
49
50
50
``` kusto
51
51
AzureActivity
52
- | where CategoryValue == "Administrative" and
53
- OperationNameValue == "Microsoft.Authorization/roleAssignments/write" and
54
- (ActivityStatusValue == "Start" or ActivityStatus == "Started")
52
+ | where CategoryValue =~ "Administrative" and
53
+ OperationNameValue =~ "Microsoft.Authorization/roleAssignments/write" and
54
+ (ActivityStatusValue =~ "Start" or ActivityStatus =~ "Started")
55
55
| extend RoleDefinition = extractjson("$.Properties.RoleDefinitionId",tostring(Properties_d.requestbody),typeof(string))
56
56
| extend PrincipalId = extractjson("$.Properties.PrincipalId",tostring(Properties_d.requestbody),typeof(string))
57
57
| extend PrincipalType = extractjson("$.Properties.PrincipalType",tostring(Properties_d.requestbody),typeof(string))
58
58
| extend Scope = extractjson("$.Properties.Scope",tostring(Properties_d.requestbody),typeof(string))
59
59
| where Scope !contains "resourcegroups"
60
60
| extend RoleId = split(RoleDefinition,'/')[-1]
61
61
| extend RoleDisplayName = case(
62
- RoleId == 'b24988ac-6180-42a0-ab88-20f7382dd24c', "Contributor",
63
- RoleId == '8e3af657-a8ff-443c-a75c-2fe8c4bcb635', "Owner",
64
- RoleId == '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9', "User Access Administrator",
62
+ RoleId =~ 'b24988ac-6180-42a0-ab88-20f7382dd24c', "Contributor",
63
+ RoleId =~ '8e3af657-a8ff-443c-a75c-2fe8c4bcb635', "Owner",
64
+ RoleId =~ '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9', "User Access Administrator",
65
65
"Irrelevant")
66
66
| where RoleDisplayName != "Irrelevant"
67
67
| project TimeGenerated,Scope, PrincipalId,PrincipalType,RoleDisplayName
0 commit comments