
Summary
The detection rule titled "O365 Admin Consent Bypassed by Service Principal" identifies instances where a service principal in Azure Active Directory (AD) within Microsoft 365 has assigned app roles without the necessary administrative consent. This detection utilizes logs from the `o365_management_activity`, specifically targeting actions where the service principal adds app role assignments. This can signal a potential bypass of established security controls, permitting unauthorized privilege escalation. Such activities might be indicative of automated processes being misused by attackers, enabling them to grant sensitive permissions without oversight, and raising significant security concerns for organizations managing their Office 365 environments.
Categories
- Cloud
- Identity Management
- Web
- Infrastructure
Data Sources
- Pod
- Cloud Service
- Application Log
ATT&CK Techniques
- T1098
- T1098.003
Created: 2024-11-14