AuditLogs
| where Category =~ "AzureRBACRoleManagementElevateAccess"
| where ActivityDisplayName =~ "User has elevated their access to User Access Administrator for their Azure Resources"
| extend Actor = tostring(InitiatedBy.user.userPrincipalName)
| extend IPAddress = tostring(InitiatedBy.user.ipAddress)
| project
TimeGenerated,
Actor,
OperationName,
IPAddress,
Result,
LoggedByService
tactics:
- PrivilegeEscalation
triggerOperator: GreaterThan
requiredDataConnectors:
- connectorId: AzureActiveDirectory
dataTypes:
- AuditLogs
relevantTechniques:
- T1078
entityMappings:
- fieldMappings:
- identifier: Name
columnName: Actor
entityType: Account
- fieldMappings:
- identifier: Address
columnName: IPAddress
entityType: IP
enabled: true
alertRuleTemplateName:
suppressionDuration: PT5H
id: 132fdff4-c044-4855-a390-c1b71e0f833b
queryPeriod: 2h
name: Azure RBAC (Elevate Access)
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Entra ID/Analytic Rules/AzureRBAC.yaml
queryFrequency: 2h
description: |
'Detects when a Global Administrator elevates access to all subscriptions and management groups in a tenant. When a Global Administrator elevates access they are assigned the User Access Administrator role at root scope. This Microsoft Sentinel Analytic Rule monitors who has elevated access in your tenant so that admins can take appropriate action. [Learn more](https://learn.microsoft.com/en-us/azure/role-based-access-control/elevate-access-global-admin?tabs=azure-portal)'
suppressionEnabled: false
version: 1.0.0
query: |
AuditLogs
| where Category =~ "AzureRBACRoleManagementElevateAccess"
| where ActivityDisplayName =~ "User has elevated their access to User Access Administrator for their Azure Resources"
| extend Actor = tostring(InitiatedBy.user.userPrincipalName)
| extend IPAddress = tostring(InitiatedBy.user.ipAddress)
| project
TimeGenerated,
Actor,
OperationName,
IPAddress,
Result,
LoggedByService
incidentConfiguration:
groupingConfiguration:
groupByAlertDetails: []
lookbackDuration: PT5H
matchingMethod: AllEntities
groupByEntities: []
groupByCustomDetails: []
reopenClosedIncident: false
enabled: false
createIncident: true
triggerThreshold: 0
severity: High
eventGroupingSettings:
aggregationKind: SingleAlert
kind: Scheduled