
Summary
This rule monitors and detects the activation of Azure's Network Watcher packet capture feature. Packet capture allows for the examination of network traffic, which can be exploited by threat actors to access sensitive information such as credentials or data. The rule aims to highlight potential abuse of this feature since although it can be beneficial for legitimate network diagnostics, when used maliciously, it presents a serious security risk. By analyzing logs related to packet capture activities, it helps identify potential credential sniffing attempts and whether such operations are part of standard troubleshooting practices.
Categories
- Cloud
- AWS
- Azure
- Network
- Infrastructure
Data Sources
- Network Traffic
- Application Log
- Cloud Service
ATT&CK Techniques
- T1040
Created: 2026-01-14