
Summary
This detection rule identifies changes to Azure Network Firewall Policies, including modifications and deletions. By monitoring Azure activity logs, it specifically looks for operations such as writing (modifying) or deleting firewall policies. The rule is significant in the context of maintaining network security, as unauthorized changes to firewall policies can indicate potential attacks or misconfigurations that could expose cloud resources to threats. The detection is based on the operation names listed in the Microsoft Azure activity logs corresponding to firewall policy operations. System administrators typically carry out legitimate modifications, so it is essential to validate the source of the changes to ensure they are authorized. Security teams should be cautious of unfamiliar users making such changes and investigate any anomalous activities. The operation names captured within the selection condition of this rule are vital for identifying potentially unauthorized actions against firewall policies in Azure environments.
Categories
- Cloud
- Azure
- Infrastructure
Data Sources
- Cloud Service
- Logon Session
Created: 2021-09-02