
Summary
The 'Azure Network Watcher Deleted' detection rule provides a mechanism to monitor and respond to the deletion of Azure Network Watcher resources. This is crucial for security operations, since adversaries target such resources to evade detection during lateral movements or data exfiltration. The rule focuses on monitoring Azure Monitor Activity logs, specifically looking for network watcher deletions and related activities that could indicate a potential attack on network visibility. When a deletion of a Network Watcher is detected, analysts are advised to investigate the associated IP addresses and the timing of deletions to determine if they are part of a coordinated attack or regular maintenance. The rule is classified with a medium severity level and is still experimental.
Categories
- Cloud
- Azure
Data Sources
- Application Log
- Cloud Service
ATT&CK Techniques
- T1562.001
Created: 2026-01-14