heroui logo

Azure Automation Webhook Created

Elastic Detection Rules

View Source
Summary
The detection rule titled 'Azure Automation Webhook Created' identifies the creation of webhooks within Azure Automation, which can be exploited by adversaries to trigger malicious runbooks. This rule is crucial for monitoring potential unauthorized automation activities as webhooks facilitate HTTP requests that can execute scripts remotely. By analyzing specific Azure activity logs, this rule highlights the operation names tied to webhook creation and focuses on successful outcomes to pinpoint potential misuse in the cloud environment. The accompanying investigation guide outlines steps for analyzing webhook activities, possible false positives from legitimate use cases, and robust response strategies if suspicious activity is detected. Users are instructed to review logs for user identification, assess runbook content, and monitor for unusual access patterns to provide a comprehensive threat response mechanism.
Categories
  • Cloud
  • Azure
  • Identity Management
Data Sources
  • User Account
  • Cloud Service
  • Application Log
Created: 2020-08-18