
Summary
The detection rule titled "Azure Alert Suppression Rule Created or Modified" is designed to monitor and identify changes to suppression rules within Azure, which are mechanisms used to filter out alerts that are deemed false positives or excessively noisy. This rule is essential for maintaining security visibility in Azure environments since these suppression rules, while beneficial for reducing alert fatigue, can be exploited by adversaries to obscure malignant activities. The detection works by querying Azure activity logs for specific operations related to the creation or modification of suppression rules. Successful events are tracked, and a series of analysis steps facilitate the investigation into these changes, intended to discern whether they are legitimate or signify potential misuse. The rule's implementation aims to bolster alert management by keeping security teams informed about suppression activities that may lead to defense evasion, reinforcing the imperative of maintaining awareness of security notifications that could otherwise be suppressed. This approach encapsulates proactive risk management by encouraging thorough reviews of user actions and their justifications, as well as emphasizing the crucial considerations of policy compliance and user identity verification.
Categories
- Cloud
- Azure
- On-Premise
Data Sources
- Cloud Service
- Application Log
ATT&CK Techniques
- T1562
Created: 2021-08-27