
Summary
This detection rule, authored by Austin Songer, identifies modifications or deletions of virtual network devices in Azure, such as network virtual appliances, virtual hubs, and virtual routers. These components are integral to managing network connectivity and traffic within cloud infrastructures. Unauthorized changes to these devices can signify malicious activity, as adversaries may aim to disrupt services or redirect traffic. The rule leverages Azure activity logs to monitor specific operations associated with these devices and generates alerts for actions identified as either WRITE (modification) or DELETE. The approach helps system administrators discern legitimate administrative actions from potential threats; thus, mitigating risks associated with unauthorized alterations. The rule includes rigorous investigation guidelines detailing log analysis and verification processes to ensure that alerts are valid and not false positives due to routine administration or automated tools. Overall, its implementation supports enhanced security and integrity for Azure environments by ensuring real-time monitoring of sensitive network device operations.
Categories
- Cloud
- Azure
Data Sources
- Cloud Service
- Network Traffic
Created: 2020-08-12