
Summary
This detection rule monitors the creation of Azure Automation accounts. Such accounts are essential for automating management tasks and can be leveraged by attackers to achieve persistence in their targeted environments. The rule evaluates Azure Monitor Activity logs to track administrative operations specifically related to the creation of automation accounts. For security teams, it's critical to examine trends when multiple accounts are created from the same IP address within a specific time frame, as this could indicate malicious behavior. The logs are analyzed for various attributes, including the resource ID and caller IP address, to determine the legitimacy of the actions performed.
Categories
- Cloud
- Azure
Data Sources
- Logon Session
- Cloud Service
- Application Log
ATT&CK Techniques
- T1078
Created: 2026-01-14