Rules Contributing to Microsoft Entra Hybrid Health AD FS Service Deleted Alert
The following rules are used to identify events when a hybrid health AD FS server is deleted. Any one or more of these will trigger the Microsoft Entra Hybrid Health AD FS Service Deleted Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Azure Active Directory Hybrid Health AD FS Service Delete |
This detection uses Azure Activity Log (Administrative category) to identify the deletion of a Microsoft Entra Hybrid health AD FS service instance in a tenant. A threat actor can create a new Health AD FS service and create a fake server to spoof AD FS signing logs. The health AD FS service can then be deleted after it is not longer needed via HTTP requests to Azure. More details
Rule IDQuery{'selection': {'CategoryValue': 'Administrative', 'ResourceId|contains': 'AdFederationService', 'OperationNameValue': 'Microsoft.ADHybridHealthService/services/delete'}, 'condition': 'selection'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,48739819-8230-4ee3-a8ea-e0289d1fb0ff Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC Tactics, Techniques, and ProceduresReferencesSeverity50 Suppression Logic Based On
Additional Information
|