heroui logo

Azure DNS Zone Modified or Deleted

Sigma Rules

View Source
Summary
This detection rule identifies potential unauthorized changes to Azure DNS zones by monitoring Azure activity logs. It triggers when operations related to DNS zones (specifically those starting with `MICROSOFT.NETWORK/DNSZONES`) are either modified or deleted. The detection is achieved by checking for specific operation names ending with 'WRITE' or 'DELETE', hinting at changes which might signify a malicious event. An administrator's action leading to changes in DNS zones could indicate a breach if done under suspicious circumstances, thus the need to monitor these actions closely. The rule can help organizations maintain DNS integrity by flagging unexpected alterations in DNS zone data, which could impact the availability and accessibility of services associated with these zones. False positives may arise from regular administrative activities, so it is recommended to verify user identities and the context of the changes to differentiate between legitimate and potentially harmful modifications.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Application Log
Created: 2021-08-08