Skip to content

Commit 2f3f4fb

Browse files
deprecating 'Azure Virtual Network Device Modified or Deleted' (#4559)
1 parent 51826ed commit 2f3f4fb

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

rules/integrations/azure/impact_virtual_network_device_modified.toml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,15 @@
22
creation_date = "2020/08/12"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/03/24"
66

77
[rule]
88
author = ["Austin Songer"]
99
description = """
1010
Identifies when a virtual network device is modified or deleted. This can be a network virtual appliance, virtual hub,
1111
or virtual router.
12+
13+
**Deprecated Notice** - This rule has been deprecated in favor of other rules that provide more contextual threat behavior for Azure Virtual Network.
1214
"""
1315
false_positives = [
1416
"""
@@ -22,13 +24,15 @@ from = "now-25m"
2224
index = ["filebeat-*", "logs-azure*"]
2325
language = "kuery"
2426
license = "Elastic License v2"
25-
name = "Azure Virtual Network Device Modified or Deleted"
27+
name = "Deprecated - Azure Virtual Network Device Modified or Deleted"
2628
note = """## Triage and analysis
2729
30+
**Deprecated Notice** - This rule has been deprecated in favor of other rules that provide more contextual threat behavior for Azure Virtual Network.
31+
2832
> **Disclaimer**:
2933
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
3034
31-
### Investigating Azure Virtual Network Device Modified or Deleted
35+
### Investigating Deprecated - Azure Virtual Network Device Modified or Deleted
3236
3337
Azure virtual network devices, such as network interfaces, virtual hubs, and routers, are crucial for managing network traffic and connectivity in cloud environments. Adversaries may target these devices to disrupt services or reroute traffic for malicious purposes. The detection rule monitors specific Azure activity logs for operations indicating modifications or deletions of these devices, helping identify potential unauthorized changes that could signify an attack.
3438

0 commit comments

Comments
 (0)