// A new Conditional Access policy was created.
AuditLogs
| where OperationName in ("Add conditional access policy")
| extend modifiedBy = tostring(InitiatedBy.user.userPrincipalName)
| extend accountName = tostring(split(modifiedBy, "@")[0])
| extend upnSuffix = tostring(split(modifiedBy, "@")[1])
| project
TimeGenerated,
OperationName,
policy = TargetResources[0].displayName,
modifiedBy,
accountName,
upnSuffix,
result = Result,
newPolicy = TargetResources[0].modifiedProperties[0].newValue
| order by TimeGenerated desc
entityMappings:
- fieldMappings:
- columnName: accountName
identifier: Name
- columnName: upnSuffix
identifier: UPNSuffix
entityType: Account
description: A new Conditional Access policy was created in Entra ID.
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Entra ID/Analytic Rules/Conditional Access - A new Conditional Access policy was created.yaml
version: 1.0.1
tactics:
- DefenseEvasion
queryPeriod: 5m
kind: Scheduled
id: 0459a1b5-909d-4783-9e27-24536b05a47f
severity: Informational
query: |
// A new Conditional Access policy was created.
AuditLogs
| where OperationName in ("Add conditional access policy")
| extend modifiedBy = tostring(InitiatedBy.user.userPrincipalName)
| extend accountName = tostring(split(modifiedBy, "@")[0])
| extend upnSuffix = tostring(split(modifiedBy, "@")[1])
| project
TimeGenerated,
OperationName,
policy = TargetResources[0].displayName,
modifiedBy,
accountName,
upnSuffix,
result = Result,
newPolicy = TargetResources[0].modifiedProperties[0].newValue
| order by TimeGenerated desc
eventGroupingSettings:
aggregationKind: AlertPerResult
triggerThreshold: 0
suppressionDuration: 5h
name: Conditional Access - A new Conditional Access policy was created
relevantTechniques:
- T1562.007
suppressionEnabled: false
incidentConfiguration:
createIncident: true
groupingConfiguration:
reopenClosedIncident: false
matchingMethod: AllEntities
groupByEntities: []
lookbackDuration: PT1H
groupByCustomDetails: []
enabled: false
groupByAlertDetails: []
requiredDataConnectors:
- connectorId: AzureActiveDirectory
dataTypes:
- AuditLogs
queryFrequency: 5m
triggerOperator: gt