Rule Library

Sigma Rules

130 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Changes to Device Registration Policy

Monitor and alert for changes to the device registration policy.

Azureauditlogs
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484 · Domain or Tenant Policy Modification
Michael EppingTue Jun 28cloud
Detectionmediumtest

Guest Users Invited To Tenant By Non Approved Inviters

Detects guest users being invited to tenant by non-approved inviters

Azureauditlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Mike DuddingtonThu Jul 28cloud
Detectionmediumtest

New Root Certificate Authority Added

Detects newly added root certificate authority to an AzureAD tenant to support certificate based authentication.

Azureauditlogs
TA0005 · Defense EvasionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+1
Harjot Shah SinghTue Mar 26cloud
Detectionhightest

Users Added to Global or Device Admin Roles

Monitor and alert for users added to device admin roles.

Azureauditlogs
TA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Michael EppingTue Jun 28cloud
Detectionhightest

Application AppID Uri Configuration Changes

Detects when a configuration change is made to an applications AppID URI.

Azureauditlogs
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0006 · Credential Access+3
Mark Morowczynski+1Thu Jun 02cloud
Detectionhightest

Added Credentials to Existing Application

Detects when a new credential is added to an existing application. Any additional credentials added outside of expected processes could be a malicious actor using those credentials.

Azureauditlogs
TA0004 · Privilege EscalationT1098.001 · Additional Cloud CredentialsTA0003 · Persistence
Mark Morowczynski+1Thu May 26cloud
Detectionhightest

Delegated Permissions Granted For All Users

Detects when highly privileged delegated permissions are granted on behalf of all users

Azureauditlogs
TA0006 · Credential AccessT1528 · Steal Application Access Token
Bailey Bercik+1Thu Jul 28cloud
Detectionlowtest

End User Consent

Detects when an end user consents to an application

Azureauditlogs
TA0006 · Credential AccessT1528 · Steal Application Access Token
Bailey Bercik+1Thu Jul 28cloud
Detectionmediumtest

End User Consent Blocked

Detects when end user consent is blocked due to risk-based consent.

Azureauditlogs
TA0006 · Credential AccessT1528 · Steal Application Access Token
Bailey Bercik+1Sun Jul 10cloud
Detectionmediumtest

Added Owner To Application

Detects when a new owner is added to an application. This gives that account privileges to make modifications and configuration changes to the application.

Azureauditlogs
T1552 · Unsecured CredentialsTA0006 · Credential Access
Mark Morowczynski+1Thu Jun 02cloud
Detectionhightest

App Granted Microsoft Permissions

Detects when an application is granted delegated or app role permissions for Microsoft Graph, Exchange, Sharepoint, or Azure AD

Azureauditlogs
TA0006 · Credential AccessT1528 · Steal Application Access Token
Bailey Bercik+1Sun Jul 10cloud
Detectionhightest

App Granted Privileged Delegated Or App Permissions

Detects when administrator grants either application permissions (app roles) or highly privileged delegated permissions

Azureauditlogs
TA0003 · PersistenceTA0004 · Privilege EscalationT1098.003 · Additional Cloud Roles
Bailey Bercik+1Thu Jul 28cloud
Detectionmediumtest

App Assigned To Azure RBAC/Microsoft Entra Role

Detects when an app is assigned Azure AD roles, such as global administrator, or Azure RBAC roles, such as subscription owner.

Azureauditlogs
TA0003 · PersistenceTA0004 · Privilege EscalationT1098.003 · Additional Cloud Roles
Bailey Bercik+1Tue Jul 19cloud
Detectionhightest

Application URI Configuration Changes

Detects when a configuration change is made to an applications URI. URIs for domain names that no longer exist (dangling URIs), not using HTTPS, wildcards at the end of the domain, URIs that are no unique to that app, or URIs that point to domains you do not control should be investigated.

Azureauditlogs
TA0001 · Initial AccessTA0005 · Defense EvasionT1528 · Steal Application Access TokenT1078.004 · Cloud Accounts+3
Mark Morowczynski+1Thu Jun 02cloud
Detectionhightest

Windows LAPS Credential Dump From Entra ID

Detects when an account dumps the LAPS password from Entra ID.

Azureauditlogs
TA0004 · Privilege EscalationTA0003 · PersistenceT1098.005 · Device Registration
andrewdanisWed Jun 26cloud
Detectionmediumtest

Change to Authentication Method

Change to authentication method could be an indicator of an attacker adding an auth method to the account so they can have continued access.

Azureauditlogs
TA0004 · Privilege EscalationTA0006 · Credential AccessT1556 · Modify Authentication ProcessTA0003 · Persistence+2
AlertIQSun Oct 10cloud
Detectionmediumtest

Azure Domain Federation Settings Modified

Identifies when an user or application modified the federation settings on the domain.

Azureauditlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Sep 06cloud
Detectionmediumtest

User Added To Group With CA Policy Modification Access

Monitor and alert on group membership additions of groups that have CA policy modification access

Azureauditlogs
TA0004 · Privilege EscalationTA0006 · Credential AccessTA0005 · Defense EvasionTA0003 · Persistence+2
Mark Morowczynski+1Thu Aug 04cloud
Detectionmediumtest

User Removed From Group With CA Policy Modification Access

Monitor and alert on group membership removal of groups that have CA policy modification access

Azureauditlogs
TA0004 · Privilege EscalationTA0006 · Credential AccessTA0005 · Defense EvasionTA0003 · Persistence+2
Mark Morowczynski+1Thu Aug 04cloud
Detectionmediumtest

Guest User Invited By Non Approved Inviters

Detects when a user that doesn't have permissions to invite a guest user attempts to invite one.

Azureauditlogs
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0003 · PersistenceTA0005 · Defense Evasion+1
Mark Morowczynski+1Wed Aug 10cloud
Detectionmediumtest

User State Changed From Guest To Member

Detects the change of user type from "Guest" to "Member" for potential elevation of privilege.

Azureauditlogs
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationTA0001 · Initial Access+1
Mike DuddingtonThu Jun 30cloud
Detectionhightest

PIM Approvals And Deny Elevation

Detects when a PIM elevation is approved or denied. Outside of normal operations should be investigated.

Azureauditlogs
TA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Tue Aug 09cloud
Detectionhightest

PIM Alert Setting Changes To Disabled

Detects when PIM alerts are set to disabled.

Azureauditlogs
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Mark Morowczynski+1Tue Aug 09cloud
Detectionhightest

Changes To PIM Settings

Detects when changes are made to PIM roles

Azureauditlogs
TA0001 · Initial AccessTA0005 · Defense EvasionTA0004 · Privilege EscalationTA0003 · Persistence+1
Mark Morowczynski+1Tue Aug 09cloud
Detectionhightest

User Added To Privilege Role

Detects when a user is added to a privileged role.

Azureauditlogs
TA0003 · PersistenceTA0001 · Initial AccessTA0004 · Privilege EscalationTA0005 · Defense Evasion+1
Mark Morowczynski+1Sat Aug 06cloud
Detectionhightest

Bulk Deletion Changes To Privileged Account Permissions

Detects when a user is removed from a privileged role. Bulk changes should be investigated.

Azureauditlogs
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Mark Morowczynski+1Fri Aug 05cloud
Detectionmediumtest

Privileged Account Creation

Detects when a new admin is created.

Azureauditlogs
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Mark Morowczynski+2Thu Aug 11cloud
Detectionhightest

Azure Subscription Permission Elevation Via AuditLogs

Detects when a user has been elevated to manage all Azure Subscriptions. This change should be investigated immediately if it isn't planned. This setting could allow an attacker access to Azure subscriptions in your environment.

Azureauditlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerFri Nov 26cloud
Detectionhightest

Temporary Access Pass Added To An Account

Detects when a temporary access pass (TAP) is added to an account. TAPs added to priv accounts should be investigated

Azureauditlogs
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+1
Mark Morowczynski+1Wed Aug 10cloud
Detectionhightest

User Risk and MFA Registration Policy Updated

Detects changes and updates to the user risk and MFA registration policy. Attackers can modified the policies to Bypass MFA, weaken security thresholds, facilitate further attacks, maintain persistence.

Azureauditlogs
TA0003 · Persistence
Harjot SinghTue Aug 13cloud
Detectionmediumtest

Multi Factor Authentication Disabled For User Account

Detects changes to the "StrongAuthenticationRequirement" value, where the state is set to "0" or "Disabled". Threat actors were seen disabling multi factor authentication for users in order to maintain or achieve access to the account. Also see in SIM Swap attacks.

Azureauditlogs
TA0006 · Credential AccessTA0003 · Persistence
Harjot SinghWed Aug 21cloud
Detectionmediumtest

Password Reset By User Account

Detect when a user has reset their password in Azure AD

Azureauditlogs
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+2
YochanaHendersonWed Aug 03cloud
Detectionhightest

Anomalous Token

Indicates that there are abnormal characteristics in the token such as an unusual token lifetime or a token that is played from an unfamiliar location.

Azureriskdetection
T1528 · Steal Application Access TokenTA0006 · Credential Access
Mark MorowczynskiMon Aug 07cloud
Detectionhightest

Anomalous User Activity

Indicates that there are anomalous patterns of behavior like suspicious changes to the directory.

Azureriskdetection
TA0004 · Privilege EscalationT1098 · Account ManipulationTA0003 · Persistence
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Activity From Anonymous IP Address

Identifies that users were active from an IP address that has been identified as an anonymous proxy IP address.

Azureriskdetection
T1078 · Valid AccountsTA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Anonymous IP Address

Indicates sign-ins from an anonymous IP address, for example, using an anonymous browser or VPN.

Azureriskdetection
T1528 · Steal Application Access TokenTA0006 · Credential Access
Gloria LeeTue Aug 22cloud
Detectionhightest

Atypical Travel

Identifies two sign-ins originating from geographically distant locations, where at least one of the locations may also be atypical for the user, given past behavior.

Azureriskdetection
T1078 · Valid AccountsTA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Impossible Travel

Identifies user activities originating from geographically distant locations within a time period shorter than the time it takes to travel from the first location to the second.

Azureriskdetection
T1078 · Valid AccountsTA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Suspicious Inbox Forwarding Identity Protection

Indicates suspicious rules such as an inbox rule that forwards a copy of all emails to an external address

Azureriskdetection
T1114.003 · Email Forwarding RuleTA0009 · Collection
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Suspicious Inbox Manipulation Rules

Detects suspicious rules that delete or move messages or folders are set on a user's inbox.

Azureriskdetection
T1140 · Deobfuscate/Decode Files or InformationTA0005 · Defense Evasion
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Azure AD Account Credential Leaked

Indicates that the user's valid credentials have been leaked.

Azureriskdetection
T1589 · Gather Victim Identity InformationTA0043 · Reconnaissance
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Malicious IP Address Sign-In Failure Rate

Indicates sign-in from a malicious IP address based on high failure rates.

Azureriskdetection
T1090 · ProxyTA0011 · Command and Control
Mark Morowczynski+1Thu Sep 07cloud
Detectionhightest

Malicious IP Address Sign-In Suspicious

Indicates sign-in from a malicious IP address known to be malicious at time of sign-in.

Azureriskdetection
T1090 · ProxyTA0011 · Command and Control
Mark Morowczynski+1Thu Sep 07cloud
Detectionhightest

Sign-In From Malware Infected IP

Indicates sign-ins from IP addresses infected with malware that is known to actively communicate with a bot server.

Azureriskdetection
T1090 · ProxyTA0011 · Command and Control
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

New Country

Detects sign-ins from new countries. The detection considers past activity locations to determine new and infrequent locations.

Azureriskdetection
T1078 · Valid AccountsTA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Password Spray Activity

Indicates that a password spray attack has been successfully performed.

Azureriskdetection
T1110 · Brute ForceTA0006 · Credential Access
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Primary Refresh Token Access Attempt

Indicates access attempt to the PRT resource which can be used to move laterally into an organization or perform credential theft

Azureriskdetection
T1528 · Steal Application Access TokenTA0006 · Credential Access
Mark Morowczynski+1Thu Sep 07cloud
Detectionhightest

Suspicious Browser Activity

Indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser

Azureriskdetection
T1078 · Valid AccountsTA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Sun Sep 03cloud