heroui logo

Azure Suppression Rule Created

Sigma Rules

View Source
Summary
This detection rule is designed to identify the creation of suppression rules in Azure, specifically through the operation name `MICROSOFT.SECURITY/ALERTSSUPPRESSIONRULES/WRITE`. Suppression rules may be leveraged by adversaries to evade security detection mechanisms, hence monitoring their creation is crucial for maintaining the integrity of security operations within Azure environments. The rule specifies that whenever such a write operation is detected, it should trigger an alert for review. The presence of suppression rules being created by unauthorized or unfamiliar users raises a potential red flag, necessitating further investigation. As an important aspect of Azure security management, unintended or malicious suppression of alerts can significantly reduce the visibility of ongoing or future attacks, making this detection mechanism vital.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Application Log
Created: 2021-08-16