heroui logo

Changes to Device Registration Policy

Sigma Rules

View Source
Summary
This detection rule monitors changes made to the device registration policies within Azure, specifically focusing on activities that could indicate potential security risks such as unauthorized modifications to policies that govern device registrations. The rule is set to trigger alerts whenever an activity labeled as 'Set device registration policies' is logged, under the 'Policy' category within Azure Audit Logs. Such changes can enable attackers to bypass security controls or escalate privileges by modifying the device registration process. Given that device registration is integral to managing and securing access to resources in an Azure environment, unauthorized alterations pose significant security threats. It is crucial for organizations to detect and respond to such changes promptly to mitigate risks associated with privilege escalation and defense evasion tactics that could exploit these vulnerabilities.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Application Log
Created: 2022-06-28