
Summary
The Azure Network Watcher Deletion detection rule identifies attempts to delete a Network Watcher resource within Azure. Network Watchers provide essential capabilities for monitoring and diagnosing network environments in Azure. Malicious actors may attempt to delete a Network Watcher to bypass security controls and disable logging, which could prevent detection of their activities. The rule analyzes Azure activity logs specifically looking for delete operations on Network Watchers, denoted by the operation name "MICROSOFT.NETWORK/NETWORKWATCHERS/DELETE" with successful outcomes. Investigative steps include reviewing Azure activity logs for deletion confirmations, identifying responsible users or service principals, and assessing impacts on the monitoring capabilities of the network. The rule also covers analysis of false positives that may arise from routine administrative tasks or automated scripts, suggesting adjustment of detection criteria for known safe activities. Immediate response actions involve isolating affected resources, identifying unauthorized actions, and restoring any deleted Network Watchers to maintain monitoring capabilities. Additionally, the rule advises enhancing access controls and auditing configurations to fortify defenses against unauthorized access to critical monitoring tools.
Categories
- Cloud
- Azure
- Network
- Infrastructure
Data Sources
- Cloud Service
- Application Log
ATT&CK Techniques
- T1562
- T1562.001
Created: 2020-08-31