
Summary
This detection rule focuses on monitoring Windows security events related to unauthorized or suspicious access attempts to the registry key associated with the Azure AD Health Monitoring Agent. The primary registry key being monitored is located at HKLM\SOFTWARE\Microsoft\Microsoft Online\Reporting\MonitoringAgent. To effectively implement this detection, a system access control list (SACL) entry must be added to this registry key, allowing security events to be logged when access attempts are made. The detection leverages Event IDs 4656 and 4663, which correspond to attempts to either create a handle to a registry key or access the key itself. A filter is applied to exclude expected processes related to the Azure AD Health Monitoring Agent, ensuring that only suspicious access attempts are flagged. By identifying unauthorized access attempts to this critical component, this detection rule can help in detecting potential reconnaissance or exploitation activities targeting Azure Active Directory environments.
Categories
- Windows
- Cloud
- Identity Management
Data Sources
- Windows Registry
- Process
Created: 2021-08-26