heroui logo

Azure AD Health Service Agents Registry Keys Access

Sigma Rules

View Source
Summary
The rule titled 'Azure AD Health Service Agents Registry Keys Access' is designed to identify suspicious access attempts to Azure AD Health service agents' registry keys, specifically targeting the Windows security events related to these actions. It focuses on the registry path HKLM:\SOFTWARE\Microsoft\ADHealthAgent, which is critical for maintaining the security of Azure Active Directory Federated Services (AD FS). The rule utilizes Event IDs 4656 and 4663, which are generated during attempts to access or modify registry keys. Access logging one level deeper is enforced by requiring an audit entry in the system access control list (SACL) for the targeted registry key, ensuring that all sub-keys are also monitored. The detection looks for a specific set of processes associated with these health service agents and establishes a condition that must be met for an alert to be triggered: successful access must occur without interference from the listed processes. While this rule can enhance security by flagging potentially malicious behavior, it is acknowledged that false positives may arise from legitimate access attempts, which are currently classified as 'Unknown.' Overall, this detection plays an important role in safeguarding the integrity of Azure AD services by monitoring registry interactions that could be exploited by attackers.
Categories
  • Windows
  • Cloud
  • Azure
Data Sources
  • Windows Registry
  • Logon Session
Created: 2021-08-26