Tag
Entra ID Excessive Account Lockouts Detected
2 rules 3 TTPsA high volume of failed Microsoft Entra ID sign-in attempts resulting in account lockouts indicates potential brute-force attacks, such as password spraying or credential stuffing, targeting user accounts.
Azure Monitor Agent Improper Input Validation Vulnerability (CVE-2026-32168)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32168 is an improper input validation vulnerability in Azure Monitor Agent that allows a locally authorized attacker to elevate privileges.
Azure Monitor Agent Deserialization Vulnerability (CVE-2026-32192) Allows Local Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32192 allows a locally authorized attacker to escalate privileges on a host running the Azure Monitor Agent via deserialization of untrusted data.
Entra ID ADRS Token Request by Microsoft Authentication Broker
2 rules 2 TTPs 1 IOCDetects suspicious OAuth 2.0 token requests where the Microsoft Authentication Broker requests access to the Device Registration Service on behalf of a user principal, potentially indicating an attempt to abuse device registration for unauthorized persistence.
Azure Service Principal Sign-In Followed by Arc Cluster Credential Access
2 rules 3 TTPsDetects a service principal authenticating to Azure AD followed by listing credentials for an Azure Arc-connected Kubernetes cluster, indicating potential adversary activity with stolen service principal secrets to establish a proxy tunnel into Kubernetes clusters.
CVE-2026-33105 - Microsoft Azure Kubernetes Service Privilege Escalation
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-33105 is a critical vulnerability in Microsoft Azure Kubernetes Service that allows an unauthorized attacker to elevate privileges over a network due to improper authorization.
Azure Databricks SSRF Vulnerability (CVE-2026-33107) Allows Privilege Escalation
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability, identified as CVE-2026-33107, exists in Azure Databricks, allowing an unauthorized attacker to elevate privileges over a network.
Azure SRE Agent Improper Authentication Vulnerability (CVE-2026-32173)
2 rules 1 TTP 1 CVEAn improper authentication vulnerability (CVE-2026-32173) in the Azure SRE Agent allows an unauthorized attacker to disclose sensitive information over the network, potentially leading to data breaches or further compromise.
Azure MCP Server Missing Authentication Vulnerability (CVE-2026-32211)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32211 is a critical vulnerability in Azure MCP Server due to missing authentication for a critical function, allowing an unauthorized attacker to disclose information over the network.
Unusual City for Azure Activity Logs Event
2 rules 3 TTPsA machine learning job detected Azure Activity Logs activity that, while not inherently suspicious or abnormal, is sourcing from a geolocation (city) that is unusual for the event action, indicating potential compromised credentials.
Entra ID Federated Identity Credential Issuer Modified
2 rules 2 TTPsModification of the issuer URL of a federated identity credential in Entra ID can allow an attacker to authenticate as the application's service principal, granting persistent access to Azure resources by pointing to an attacker-controlled identity provider and bypassing normal authentication.
Azure Service Principal Sign-In Followed by Arc Cluster Credential Access
2 rules 2 TTPsDetects a service principal authenticating to Microsoft Entra ID and then listing credentials for an Azure Arc-connected Kubernetes cluster within a short time window, indicating potential unauthorized access to Kubernetes clusters via stolen service principal secrets.
Unauthorized Modification of Azure Conditional Access Policy
2 rules 2 TTPsAn unauthorized actor modifies an Azure Conditional Access policy, potentially leading to privilege escalation, credential access, persistence, or defense impairment.
Azure AD Certificate-Based Authentication Enabled
2 rules 1 TTPEnabling certificate-based authentication (CBA) in Azure Active Directory can be abused by attackers to establish persistence, escalate privileges, and impair defenses.
Azure Identity Protection Suspicious Browser Activity
2 rules 6 TTPsA suspicious browser activity alert indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser, potentially indicating compromised credentials or other malicious activity.
Azure Firewall Rule Collection Modification or Deletion
2 rules 2 TTPsAn attacker may modify or delete Azure Firewall rule collections (Application, NAT, and Network) to impair defenses and potentially enable malicious traffic.
Azure AD Sign-In with Unfamiliar Properties
2 rules 4 TTPsThis alert detects Azure AD sign-ins with properties unfamiliar to the user, indicating potential account compromise or unauthorized access.
Azure AD Device Registration Policy Changes Detected
2 rules 1 TTPMonitoring changes to the device registration policy can detect potential privilege escalation or defense impairment attempts by malicious actors aiming to weaken security controls related to device management in Azure Active Directory.
Spoofing AD FS Signing Logs via Azure AD Hybrid Health Service
2 rules 1 TTPA threat actor can create a new, rogue AD Health ADFS service within Azure and then create a fake server instance, which can be leveraged to spoof AD FS signing logs without compromising on-prem AD FS servers.
Azure Authentication Method Change Detection
2 rules 3 TTPsAn attacker may add an authentication method to a compromised Azure account for persistent access, which can be detected by monitoring changes to authentication methods in Azure audit logs.
Azure Privileged Identity Management (PIM) Invalid License Detection
2 rules 1 TTPDetection of unauthorized access or privilege escalation attempts within Azure environments due to invalid or missing Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses for Privileged Identity Management (PIM).
Azure Kubernetes Events Deleted
2 rules 1 TTPAdversaries may delete events in Azure Kubernetes to evade detection, which this rule detects via the MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE operation.
Unauthorized Removal of Azure Conditional Access Policy
2 rules 3 TTPsAn unauthorized actor removes a Conditional Access policy in Azure, potentially weakening the organization's security posture and enabling privilege escalation or credential access.
Azure PIM Account Stale Sign-in Alert
2 rules 1 TTPDetection of stale accounts in Azure Privileged Identity Management (PIM) through the 'staleSignInAlertIncident' event, indicating potential compromised or unused privileged accounts.
Azure Firewall Modification or Deletion Detected
2 rules 1 TTPAn Azure firewall was created, modified, or deleted, potentially indicating malicious activity aimed at impairing network defenses.
Azure AD Bitlocker Key Retrieval
2 rules 3 TTPsAn adversary with sufficient privileges in Azure Active Directory may attempt to retrieve BitLocker keys to decrypt drives for lateral movement or data exfiltration.
Azure PIM Elevation Approved or Denied
2 rules 3 TTPsDetection of Azure Privileged Identity Management (PIM) elevation approvals or denials, which, if unexpected, may indicate unauthorized privilege escalation or malicious activity within an Azure environment.
Azure PIM Role Activation Without MFA
2 rules 1 TTPDetection of Azure Privileged Identity Management (PIM) roles being activated without requiring multi-factor authentication, potentially leading to unauthorized privilege escalation and persistence.
Detect Application AppID URI Configuration Changes in Azure
2 rules 2 TTPsDetection of configuration changes to an application's AppID URI in Azure, potentially indicating malicious activity related to initial access, persistence, credential access, privilege escalation, or stealth.
Malicious Azure Kubernetes Admission Controller Configuration
2 rules 4 TTPsAn adversary can exploit Kubernetes Admission Controllers in Azure to achieve persistence, privilege escalation, or credential access by manipulating webhook configurations.
Detection of Azure Application Deletion
2 rules 1 TTPThis alert identifies when an application is deleted within an Azure environment, which could indicate malicious activity or unintended misconfiguration leading to service disruption.
Azure AD User Password Reset Detection
2 rules 1 TTPDetects when a user successfully resets their own password in Azure Active Directory, which may indicate malicious activity or account compromise.
Azure AD Guest to Member User Type Conversion
2 rules 1 TTPAn adversary may convert a guest user account to a member account in Azure Active Directory to elevate privileges and gain persistent access to resources.
Excessive Global Administrator Accounts in Azure PIM
2 rules 3 TTPsDetection of an excessive number of Global Administrator accounts assigned within an Azure tenant, indicating potential privilege escalation or compromised accounts.
Detection of Privileged Identity Management (PIM) Settings Modifications
2 rules 4 TTPsDetects unauthorized or malicious modifications to Privileged Identity Management (PIM) settings within Azure environments, potentially leading to privilege escalation, persistence, and stealthy access by attackers.
Detection of Azure Service Principal Creation
3 rules 1 TTPDetects the creation of a service principal in Azure, which could indicate potential attacker activity for lateral movement or persistence.
Azure AD Hybrid Health AD FS Service Deletion for Defense Evasion
2 rules 1 TTPThreat actors may delete Azure AD Hybrid Health AD FS service instances after using them to spoof AD FS signing logs for defense evasion.
Azure Service Principal Removal Detection
2 rules 1 TTPDetection of a service principal removal in Azure, potentially indicating malicious activity or an attempt to remove evidence of a compromise.
Azure Application URI Configuration Modification
3 rules 4 TTPsDetection of Azure application URI modifications that can be indicative of malicious activity, such as using dangling URIs, non-HTTPS URIs, wildcard domains, or URIs pointing to uncontrolled domains, potentially leading to initial access, stealth, persistence, credential access, and privilege escalation.
User Removed from Group with Conditional Access Policy Modification Access
2 rules 3 TTPsAn attacker removes a user from a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, persistence, or defense evasion.
Unused Privileged Identity Management (PIM) Roles in Azure
2 rules 1 TTPDetection of assigned but unused privileged roles in Azure's Privileged Identity Management (PIM) service, indicating potential misconfiguration, license overuse, or dormant privileged access that could be exploited.
Unauthorized Guest User Invitation Attempt in Azure
2 rules 1 TTPDetection of a failed attempt to invite an external guest user by an Azure user lacking the necessary permissions, potentially indicating privilege escalation or malicious insider activity.
Unauthorized Conditional Access Policy Creation in Azure AD
2 rules 1 TTPAn unauthorized actor created a new Conditional Access policy in Azure AD, potentially leading to privilege escalation and unauthorized access.
Privileged Identity Management (PIM) Alerting Disabled
2 rules 1 TTPAn adversary disables Privileged Identity Management (PIM) alerts in Azure to evade detection and maintain persistent access with escalated privileges.
Frequent Azure PIM Role Activation Detected
2 rules 3 TTPsDetection of frequent role activation in Azure Privileged Identity Management (PIM) by the same user may indicate potential privilege escalation or account compromise.
Detection of Privileged Account Creation in Azure
2 rules 3 TTPsDetects the creation of new privileged accounts in Azure environments, potentially indicating initial access, persistence, privilege escalation, or stealth activities by malicious actors.
Azure Subscription Permission Elevation via Activity Logs
2 rules 1 TTPAn attacker elevates their Azure subscription permissions to manage all subscriptions, potentially leading to unauthorized access and control over the environment.
Azure Owner Removed from Application or Service Principal
2 rules 1 TTPAn adversary may remove an owner from an Azure application or service principal to weaken access controls, persist in the environment, or escalate privileges.
Azure AD MFA Disabled to Bypass Authentication
2 rules 1 TTPAn adversary may disable multi-factor authentication (MFA) in Azure Active Directory to weaken an organization's security posture and bypass authentication mechanisms, potentially gaining unauthorized access to sensitive resources and maintaining persistence.
Azure Identity Protection Atypical Travel Anomaly
2 rules 1 TTPThe Atypical Travel detection in Azure Identity Protection identifies potentially compromised user accounts by detecting geographically improbable sign-in activity, indicative of account compromise or misuse.
Azure AD Privileged Role Assignment
2 rules 2 TTPsDetection of a user being added to a privileged role in Azure AD, potentially indicating privilege escalation or persistence by an attacker.
Azure PIM - Role Assignment Outside of Privileged Identity Management
2 rules 4 TTPsDetection of privilege role assignments outside of Azure Privileged Identity Management (PIM) can indicate potential attacker activity related to initial access, stealth, persistence, or privilege escalation within the Azure environment.
Azure Domain Federation Settings Modified
2 rules 2 TTPsAn attacker may modify Azure domain federation settings to establish persistence, escalate privileges, or gain unauthorized access to resources.