
Summary
The Microsoft Intune Manual Device Management detection rule aims to identify and alert on potentially malicious behavior associated with the manual synchronization of device management configuration policies within the Microsoft Intune environment. The rule is particularly focused on detecting instances when configuration policies are manually pushed to devices instead of waiting for standard polling intervals. This could indicate an attacker’s attempt to hasten the deployment of malicious payloads or gain unauthorized access to managed devices. The rule utilizes Azure Monitor Activity as the primary data source, specifically tracking events related to 'ManagedDevice' operations. By analyzing these events, the detection can pinpoint when on-demand remediation scripts are executed or when remote restarts of devices occur. Admins are advised to implement the rule as part of risk-based alerting strategies, while also being aware of legitimate triggers from routine administrative actions that may result in false positives.
Categories
- Cloud
- Azure
- Endpoint
- Application
Data Sources
- Cloud Service
- Service
- Logon Session
ATT&CK Techniques
- T1021.007
- T1072
- T1529
Created: 2025-01-07