You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Rule Tuning] Azure AD Global Administrator Role Assigned (#5090)
* updating Azure AD Global Administrator Role Assigned
* removed logic changes as it only effects outside of PIM. Adding a different rule for these
* slight change to query
* tuning severity
* Update rules/integrations/azure/persistence_azure_global_administrator_role_assigned.toml
Co-authored-by: Mika Ayenson, PhD <[email protected]>
* Update rules/integrations/azure/persistence_azure_global_administrator_role_assigned.toml
* Update rules/integrations/azure/persistence_azure_global_administrator_role_assigned.toml
---------
Co-authored-by: Mika Ayenson, PhD <[email protected]>
Copy file name to clipboardExpand all lines: rules/integrations/azure/persistence_azure_global_administrator_role_assigned.toml
+31-23Lines changed: 31 additions & 23 deletions
Original file line number
Diff line number
Diff line change
@@ -2,39 +2,38 @@
2
2
creation_date = "2022/01/06"
3
3
integration = ["azure"]
4
4
maturity = "production"
5
-
updated_date = "2025/01/15"
5
+
updated_date = "2025/09/11"
6
6
7
7
[rule]
8
8
author = ["Elastic"]
9
9
description = """
10
-
In Azure Active Directory (Azure AD), permissions to manage resources are assigned using roles. The Global Administrator
11
-
is a role that enables users to have access to all administrative features in Azure AD and services that use Azure AD
10
+
In Microsoft Entra ID, permissions to manage resources are assigned using roles. The Global Administrator
11
+
is a role that enables users to have access to all administrative features in Microsoft Entra ID and services that use Microsoft Entra ID
12
12
identities like the Microsoft 365 Defender portal, the Microsoft 365 compliance center, Exchange, SharePoint Online, and
13
13
Skype for Business Online. Attackers can add users as Global Administrators to maintain access and manage all
14
-
subscriptions and their settings and resources.
14
+
subscriptions and their settings and resources. They can also elevate privilege to User Access Administrator to pivot into Azure resources.
15
15
"""
16
-
from = "now-25m"
17
-
index = ["filebeat-*", "logs-azure*"]
16
+
from = "now-9m"
17
+
index = ["filebeat-*", "logs-azure.auditlogs-*"]
18
18
language = "kuery"
19
19
license = "Elastic License v2"
20
-
name = "Azure AD Global Administrator Role Assigned"
20
+
name = "Entra ID Global Administrator Role Assigned"
21
21
note = """## Triage and analysis
22
22
23
-
> **Disclaimer**:
24
-
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
23
+
### Investigating Entra ID Global Administrator Role Assigned
25
24
26
-
### Investigating Azure AD Global Administrator Role Assigned
27
-
28
-
Azure AD's Global Administrator role grants comprehensive access to manage Azure AD and associated services. Adversaries may exploit this by assigning themselves or others to this role, ensuring persistent control over resources. The detection rule identifies such unauthorized assignments by monitoring specific audit logs for role changes, focusing on the addition of members to the Global Administrator role, thus helping to mitigate potential security breaches.
25
+
Microsoft Entra ID's Global Administrator role grants comprehensive access to manage Microsoft Entra ID and associated services. Adversaries may exploit this by assigning themselves or others to this role, ensuring persistent control over resources. The detection rule identifies such unauthorized assignments by monitoring specific audit logs for role changes, focusing on the addition of members to the Global Administrator role, thus helping to mitigate potential security breaches.
29
26
30
27
### Possible investigation steps
31
28
32
-
- Review the Azure audit logs to identify the user account that performed the "Add member to role" operation, focusing on the specific event dataset and operation name.
29
+
- Review the Microsoft Entra ID audit logs to identify the user account that performed the "Add member to role" operation, focusing on the specific event dataset and operation name.
33
30
- Verify the identity of the user added to the Global Administrator role by examining the modified properties in the audit logs, specifically the new_value field indicating "Global Administrator".
34
31
- Check the history of role assignments for the identified user to determine if this is a recurring pattern or a one-time event.
35
32
- Investigate the source IP address and location associated with the role assignment event to assess if it aligns with expected user behavior or if it indicates potential unauthorized access.
36
33
- Review any recent changes or activities performed by the newly assigned Global Administrator to identify any suspicious actions or configurations that may have been altered.
37
34
- Consult with the organization's IT or security team to confirm if the role assignment was authorized and aligns with current administrative needs or projects.
35
+
- Correlate with Microsoft Entra ID sign-in logs to check for any unusual login patterns or failed login attempts associated with the user who assigned the role.
36
+
- Review the reported device to determine if it is a known and trusted device or if it raises any security concerns such as unexpected relationships with the source user.
38
37
39
38
### False positive analysis
40
39
@@ -52,24 +51,33 @@ Azure AD's Global Administrator role grants comprehensive access to manage Azure
52
51
- Implement conditional access policies to restrict Global Administrator role assignments to specific, trusted locations or devices.
53
52
- Review and update role assignment policies to ensure that only a limited number of trusted personnel have the ability to assign Global Administrator roles.
54
53
- Enhance monitoring and alerting mechanisms to detect similar unauthorized role assignments in the future, ensuring timely response to potential threats.
55
-
56
-
## Setup
57
-
58
-
The Azure Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
0 commit comments