You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Rule Tuning] Microsoft Entra ID Elevated Access to User Access Administrator (#5107)
* updating Azure AD Global Administrator Role Assigned
* removed logic changes as it only effects outside of PIM. Adding a different rule for these
* slight change to query
* tuning rule Microsoft Entra ID Elevated Access to User Access Administrator
* revert changes
* Added operation name to query logic
Copy file name to clipboardExpand all lines: rules/integrations/azure/privilege_escalation_entra_id_elevate_to_user_administrator_access.toml
+11-7Lines changed: 11 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
creation_date = "2025/05/22"
3
3
integration = ["azure"]
4
4
maturity = "production"
5
-
updated_date = "2025/05/22"
5
+
updated_date = "2025/09/15"
6
6
7
7
[rule]
8
8
author = ["Elastic", "Austin Songer"]
@@ -23,7 +23,7 @@ note = """## Triage and Analysis
23
23
24
24
### Investigating Microsoft Entra ID Elevated Access to User Access Administrator
25
25
26
-
This rule identifies when a user elevates their permissions to the "User Access Administrator" role in Microsoft Entra ID (Azure AD). This role allows full control over access management for Azure resources and can be abused by attackers for lateral movement, persistence, or privilege escalation. Since this is a **New Terms** rule, the alert will only trigger if the user has not performed this elevation in the past 14 days, helping reduce alert fatigue.
26
+
This rule identifies when a user elevates their permissions to the "User Access Administrator" role in Azure RBAC. This role allows full control over access management for Azure resources and can be abused by attackers for lateral movement, persistence, or privilege escalation. Since this is a New Terms rule, the alert will only trigger if the user has not performed this elevation in the past 14 days, helping reduce alert fatigue.
27
27
28
28
### Possible investigation steps
29
29
@@ -61,12 +61,14 @@ This rule identifies when a user elevates their permissions to the "User Access
0 commit comments