
Summary
This rule detects modifications or deletions to Azure Firewall Rule Configurations by monitoring specific operations within Azure activity logs. The key operations being tracked include updates and deletions of rule collection groups and rule groups under the Microsoft.Network resource provider. By identifying these actions, organizations can ensure that any unauthorized changes to their firewall configurations are promptly addressed, thus maintaining the security and integrity of their network.
The detection logic relies on Azure's activity logs, focusing on operations that change firewall policies. It flags activity when either a rule collection group or a rule group is modified or removed. Given the critical nature of firewall configurations, any such changes warrant investigation to prevent potential security risks or unintentional service disruptions. The rule is particularly useful for monitoring changes made by administrators and for identifying potentially malicious activity by unauthorized users within the Azure environment.
Categories
- Cloud
- Azure
Data Sources
- Cloud Service
- Application Log
- Network Traffic
Created: 2021-08-08