
Summary
This rule detects the deletion of Azure Virtual Machines (VMs) by monitoring Azure Monitor Activity logs. Deleting a VM might indicate normal operations such as deprovisioning, but it could also signal malicious activities aimed at disrupting services or causing data loss. The rule captures key information such as the resource ID, caller's IP address, and correlation ID to investigate potentially suspicious activities surrounding VM deletions. Using threat intelligence, analysts can determine if the IP is connected to known malicious activity or legitimate service providers. The rule includes steps for verification and cross-analysis of related actions to assess the extent of any potential threats. Notably, it adheres to the MITRE ATT&CK framework, highlighting its relevance to tactics involving impact and data destruction.
Categories
- Cloud
- Azure
- Infrastructure
Data Sources
- Cloud Service
- Logon Session
- Application Log
ATT&CK Techniques
- T1485
- T1489
Created: 2026-01-14