
Summary
The Azure Excessive Network Security Group Read rule aims to identify potential reconnaissance activities by detecting excessive read operations on Azure Network Security Groups (NSGs). An adversary may engage in repeated read actions to map out network ports and firewall rules, seeking insights into the security configurations of an environment. This behavior is crucial as it may precede lateral movement or data exfiltration attempts. The rule is configured to trigger an alert whenever there are more than 50 read operations on the same NSG within a defined time frame. By analyzing these logs, security teams can discern whether the activity is part of legitimate administrative functions or malicious reconnaissance. The rule's status is currently set to experimental, indicating ongoing testing and refinement processes.
Categories
- Cloud
- Azure
Data Sources
- Cloud Service
- Application Log
ATT&CK Techniques
- T1046
- T1595.002
Created: 2026-01-14