heroui logo

Unusual Azure Activity Logs Event for a User

Elastic Detection Rules

View Source
Summary
This detection rule is designed to identify unusual activities in Azure Activity Logs that deviate from the typical user behavior. Specifically, it flags cases where a user account performs event actions that are not commonly associated with that particular account. This scenario could indicate compromised credentials being used to exfiltrate data, move laterally within the environment, or carry out other malicious tasks, even if the events themselves may not seem suspicious. The rule is powered by machine learning and utilizes data from Azure Activity Logs to analyze and identify these rare event actions. It aims to provide alerts for potential threats while allowing organizations to investigate further if necessary. The rule operates on a specified anomaly threshold and is set to check for unusual user activities periodically, thus enabling timely detection of potentially malicious activities. In case of false positives, the rule accounts for various legitimate reasons that might explain new or unusual patterns, emphasizing the importance of thorough investigation before concluding a security incident.
Categories
  • Cloud
  • Identity Management
  • Application
Data Sources
  • Cloud Service
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1078
  • T1078.004
  • T1021
  • T1021.007
  • T1041
Created: 2025-10-06