heroui logo

Azure Device or Configuration Modified or Deleted

Sigma Rules

View Source
Summary
This detection rule is designed to identify modifications or deletions of devices and their configurations within the Azure environment. It monitors Azure activity logs for specific operational messages that indicate such actions, including 'Delete device', 'Delete device configuration', 'Update device', and 'Update device configuration'. By flagging these events, the rule helps system administrators to quickly respond to potential unauthorized changes that could impact security or disrupt service continuity. As the Azure environment relies heavily on configuration and device management, timely detection of these actions is critical for maintaining security posture. The rule requires Azure activity log data as input to function effectively, and special attention should be given to contextual factors such as user identity and the legitimacy of the executing user agent to mitigate false positives.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Logon Session
Created: 2021-09-03