Detectionmediumtest

Azure Active Directory Hybrid Health AD FS Service Delete

This detection uses azureactivity logs (Administrative category) to identify the deletion of an Azure AD Hybrid health AD FS service instance in a tenant. A threat actor can create a new AD Health ADFS service and create a fake server to spoof AD FS signing logs. The health AD FS service can then be deleted after it is not longer needed via HTTP requests to Azure.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTICCreated Thu Aug 26Updated Wed Oct 1148739819-8230-4ee3-a8ea-e0289d1fb0ffcloud
Log Source
Azureactivitylogs
ProductAzure← raw: azure
Serviceactivitylogs← raw: activitylogs
Detection Logic
Detection Logic1 selector
detection:
    selection:
        CategoryValue: 'Administrative'
        ResourceProviderValue: 'Microsoft.ADHybridHealthService'
        ResourceId|contains: 'AdFederationService'
        OperationNameValue: 'Microsoft.ADHybridHealthService/services/delete'
    condition: selection
False Positives

Legitimate AAD Health AD FS service instances being deleted in a tenant

Rule Metadata
Rule ID
48739819-8230-4ee3-a8ea-e0289d1fb0ff
Status
test
Level
medium
Type
Detection
Created
Thu Aug 26
Modified
Wed Oct 11
Path
rules/cloud/azure/activity_logs/azure_aadhybridhealth_adfs_service_delete.yml
Raw Tags
attack.defense-evasionattack.t1578.003
View on GitHub