Skip to content

Commit 5515f6b

Browse files
[Rule Tuning] Microsoft 365 Global Administrator Role Assigned
Fixes #5288
1 parent 3a52db2 commit 5515f6b

File tree

1 file changed

+3
-7
lines changed

1 file changed

+3
-7
lines changed

rules/integrations/o365/persistence_microsoft_365_global_administrator_role_assign.toml

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,12 @@
22
creation_date = "2022/01/06"
33
integration = ["o365"]
44
maturity = "production"
5-
updated_date = "2025/09/08"
5+
updated_date = "2025/11/08"
66

77
[rule]
88
author = ["Elastic"]
99
description = """
10-
In Microsoft Entra ID, permissions to manage resources are assigned using roles. The Global Administrator / Company Administrator
11-
is a role that enables users to have access to all administrative features in Entra ID and services that use Entra ID
12-
identities like the Microsoft 365 Defender portal, the Microsoft 365 compliance center, Exchange, SharePoint Online, and
13-
Skype for Business Online. Adversaries can add users as Global Administrators to maintain access and manage all
14-
subscriptions and their settings and resources.
10+
Identifies when the Microsoft 365 Global Administrator or Company Administrator role is assigned to a user or service principal. The Global Administrator role has extensive privileges across Entra ID and Microsoft 365 services, making it a high-value target for adversaries seeking persistent access. Successful assignments of this role may indicate potential privilege escalation or unauthorized access attempts, especially if performed by accounts that do not typically manage high-privilege roles.
1511
"""
1612
from = "now-9m"
1713
index = ["logs-o365.audit-*"]
@@ -63,6 +59,7 @@ severity = "medium"
6359
tags = [
6460
"Domain: Cloud",
6561
"Domain: SaaS",
62+
"Domain: Identity",
6663
"Data Source: Microsoft 365",
6764
"Data Source: Microsoft 365 Audit Logs",
6865
"Use Case: Identity and Access Audit",
@@ -82,7 +79,6 @@ event.dataset:o365.audit
8279
)
8380
and o365.audit.AzureActiveDirectoryEventType: 1
8481
and o365.audit.RecordType: 8
85-
and not o365.audit.Target.Type: (4 or 5 or 6)
8682
'''
8783

8884

0 commit comments

Comments
 (0)