Rules : Azure - Member Added to Non-Global Administrator Role
Detects member additions to a non-administrative role. This is a routine activity, but could be performed by an adversary to escalate privileges.
Detail
Value
Type
Templated Match
Category
Persistence
Apply Risk to Entities
device_hostname, device_ip, targetUser_username, user_username, srcDevice_ip
Signal Name
Azure - Member Added to {{fields['properties.targetResources.1.modifiedProperties.2.newValue']}} Role
Summary Expression
{{changeTarget}} added to {{fields['properties.targetResources.1.modifiedProperties.2.newValue']}} role by IP {{device_ip}}
Score/Severity
Static: 3
Enabled by Default
True
Prototype
False
Tags
_mitreAttackTactic:TA0003, _mitreAttackTactic:TA0004, _mitreAttackTechnique:T1098, _mitreAttackTechnique:T1098.001, _mitreAttackTechnique:T1098.002
Origin
Field
Normalized Schema
action
Normalized Schema
device_hostname
Normalized Schema
device_ip
Direct from Record
fields['properties.targetResources.1.modifiedProperties.2.newValue']
Normalized Schema
metadata_deviceEventId
Normalized Schema
metadata_product
Normalized Schema
metadata_vendor
Normalized Schema
srcDevice_ip
Normalized Schema
targetUser_username
Normalized Schema
user_username