
Summary
This detection rule analyzes audit logs from Azure Active Directory to identify instances when Privileged Identity Management (PIM) alert settings are changed to 'disabled.' The alert settings are critical in monitoring privileged actions within an organization, and disabling these alerts can indicate a potential security risk or misconfiguration. The rule focuses on entries in audit logs containing the specific message 'Disable PIM Alert.' If such a record is present, it triggers an alert condition that requires further investigation. It's essential to differentiate between legitimate administrative changes and potential malicious actions, as this rule may generate false positives when administrators disable alerts intentionally during maintenance or updates. Therefore, organizations should establish clear operational protocols surrounding PIM alert management to mitigate risks associated with this type of change.
Categories
- Cloud
- Identity Management
- Azure
Data Sources
- Cloud Service
- Application Log
Created: 2022-08-09