Rules Contributing to Suspicious Microsoft Entra Service Principal Activity Alert
The following rules are used to identify suspicious Microsoft Entra service principal activity. Any one or more of these will trigger the Suspicious Microsoft Entra Service Principal Activity Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Azure Service Principal Created |
Identifies when a service principal is created in Azure. More details
Rule IDQuery{'selection': {'properties_message': 'Add service principal'}, 'condition': 'selection'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,0ddcff6d-d262-40b0-804b-80eb592de8e3 Author: Austin Songer @austinsonger Tactics, Techniques, and ProceduresReferencesSeverity50 Suppression Logic Based On
Additional Information
|
||||||||
Azure Service Principal Removed |
Identifies when a service principal was removed in Azure. More details
Rule IDQuery{'selection': {'properties_message': 'Remove service principal'}, 'condition': 'selection'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,448fd1ea-2116-4c62-9cde-a92d120e0f08 Author: Austin Songer @austinsonger Tactics, Techniques, and ProceduresReferencesSeverity50 Suppression Logic Based On
Additional Information
|