Azure AD Device Registration Policy Changes Detected
Monitoring changes to the device registration policy can detect potential privilege escalation or defense impairment attempts by malicious actors aiming to weaken security controls related to device management in Azure Active Directory.
The device registration policy in Azure Active Directory controls which devices can be registered or joined to the Azure AD tenant. Modification of this policy can weaken security controls, allowing unauthorized devices to access corporate resources. This activity is often associated with threat actors attempting to escalate privileges or impair existing defenses. This brief focuses on detecting changes to the Azure AD device registration policies using Azure Audit Logs, providing detection engineers with the ability to monitor and alert on potentially malicious modifications to this critical security control.
Attack Chain
- The attacker compromises an account with sufficient privileges to modify Azure AD policies, such as a Global Administrator or Privileged Role Administrator.
- The attacker authenticates to the Azure portal or uses Azure PowerShell/CLI to interact with Azure AD.
- The attacker modifies the device registration policy, potentially allowing non-compliant devices to register or join the domain. This may involve changing settings related to multi-factor authentication, device compliance, or allowed operating systems.
- The Azure AD Audit Logs record an event with ActivityDisplayName equal to ‘Set device registration policies’ under the ‘Policy’ Category.
- The attacker registers a rogue device that does not meet the organization’s security standards.
- The rogue device gains access to sensitive corporate resources, bypassing intended security controls.
- The attacker uses the rogue device to perform further malicious activities, such as data exfiltration or lateral movement.
Impact
Successful modification of the device registration policy can lead to unauthorized devices accessing sensitive corporate resources, bypassing multi-factor authentication or device compliance requirements. This can result in data breaches, privilege escalation, and further compromise of the Azure AD environment. The impact can be severe if the attacker leverages the policy change to register multiple rogue devices, creating a persistent backdoor into the organization’s resources.
Recommendation
- Deploy the Sigma rule “Changes to Device Registration Policy” to your SIEM and tune for your environment to detect unauthorized modifications to device registration policies (rule).
- Review Azure AD audit logs for any unexpected “Set device registration policies” events (logsource).
- Implement multi-factor authentication for all administrative accounts to prevent unauthorized policy changes (TTP).
Detection coverage 2
Azure AD Device Registration Policy Modified
highDetects modifications to the Azure AD device registration policy.
Azure AD Device Registration Policy Modified by Unusual User
mediumDetects modifications to the Azure AD device registration policy made by a user who rarely performs this action.
Detection queries are kept inside the platform. Get full rules →