Rules Contributing to Suspicious Azure Deployment Activity Alert
The following rules are used to identify suspicious Azure deployment activity. Any one or more of these will trigger the Suspicious Azure Deployment Activity Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Number Of Resource Creation Or Deployment Activities |
Number of VM creations or deployment activities occur in Azure via Azure Activity Log. More details
Rule IDQuery{'selection': {'OperationNameValue': ['Microsoft.Compute/virtualMachines/write', 'Microsoft.Resources/deployments/write']}, 'condition': 'selection'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,d2d901db-7a75-45a1-bc39-0cbf00812192 Author: sawwinnnaung Tactics, Techniques, and ProceduresReferencesSeverity50 Suppression Logic Based On
Additional Information
|
||||||||
Azure Container Registry Modified or Deleted |
Detects when a Container Registry is created, updated, or deleted. More details
Rule IDQuery{'selection': {'operationName': ['MICROSOFT.CONTAINERREGISTRY/REGISTRIES/WRITE', 'MICROSOFT.CONTAINERREGISTRY/REGISTRIES/DELETE']}, 'condition': 'selection'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,93e0ef48-37c8-49ed-a02c-038aab23628e Author: Austin Songer @austinsonger Tactics, Techniques, and ProceduresReferencesSeverity25 Suppression Logic Based On
Additional Information
|