
Summary
The rule 'Azure Excessive IP and VM Discovery' is designed to detect suspicious activity associated with excessive read operations on Azure public IP addresses and virtual machines. This type of behavior is often a precursor to reconnaissance attempts by adversaries who aim to map out network assets and identify potential targets for exploitation. The rule is based on observing a threshold of 50 reads on the same resource type within a defined time frame. It highlights the importance of monitoring and analyzing read access patterns that can reveal an adversary's intent to conduct lateral movements or privilege escalation maneuvers. In particular, the detection can help to identify unusual reconnaissance activity by tracking the caller's IP address and correlating it with other resource accesses. The logging of operations and the establishment of normal activity patterns can aid in distinguishing benign administrative actions from malicious behavior.
Categories
- Cloud
- Infrastructure
- Identity Management
Data Sources
- User Account
- Network Traffic
- Cloud Service
ATT&CK Techniques
- T1046
- T1018
- T1595.002
Created: 2026-01-14