
Summary
This detection rule targets the Azure environment to identify devices that have lost their compliance or management status. The key indicator for this rule is the log messages that indicate either 'Device no longer compliant' or 'Device no longer managed'. When these specific messages are logged in Azure's activity logs, it suggests that a device may not adhere to the organization's policies or control measures, potentially exposing the network to security risks. This rule can help administrators quickly respond to non-compliant devices and ensure proper management practices are enforced within the Azure infrastructure. The alert has a medium severity level as it requires further investigation to determine if the device's compliance issues present real security risks or if they are due to administrative oversight. False positives may occur if an administrator fails to regularly review device compliance status. For further details, refer to the official Microsoft documentation.
Categories
- Cloud
- Azure
Data Sources
- Cloud Service
- Application Log
Created: 2021-09-03