AuditLogs
| where Category =~ "AzureRBACRoleManagementElevateAccess"
| where ActivityDisplayName =~ "User has elevated their access to User Access Administrator for their Azure Resources"
| extend Actor = tostring(InitiatedBy.user.userPrincipalName)
| extend IPAddress = tostring(InitiatedBy.user.ipAddress)
| project
TimeGenerated,
Actor,
OperationName,
IPAddress,
Result,
LoggedByService
query: |
AuditLogs
| where Category =~ "AzureRBACRoleManagementElevateAccess"
| where ActivityDisplayName =~ "User has elevated their access to User Access Administrator for their Azure Resources"
| extend Actor = tostring(InitiatedBy.user.userPrincipalName)
| extend IPAddress = tostring(InitiatedBy.user.ipAddress)
| project
TimeGenerated,
Actor,
OperationName,
IPAddress,
Result,
LoggedByService
requiredDataConnectors:
- dataTypes:
- AuditLogs
connectorId: AzureActiveDirectory
alertRuleTemplateName:
name: Azure RBAC (Elevate Access)
entityMappings:
- fieldMappings:
- identifier: Name
columnName: Actor
entityType: Account
- fieldMappings:
- identifier: Address
columnName: IPAddress
entityType: IP
kind: Scheduled
triggerThreshold: 0
incidentConfiguration:
createIncident: true
groupingConfiguration:
enabled: false
groupByCustomDetails: []
groupByAlertDetails: []
reopenClosedIncident: false
matchingMethod: AllEntities
lookbackDuration: PT5H
groupByEntities: []
queryPeriod: 2h
description: |
'Detects when a Global Administrator elevates access to all subscriptions and management groups in a tenant. When a Global Administrator elevates access they are assigned the User Access Administrator role at root scope. This Microsoft Sentinel Analytic Rule monitors who has elevated access in your tenant so that admins can take appropriate action. [Learn more](https://learn.microsoft.com/en-us/azure/role-based-access-control/elevate-access-global-admin?tabs=azure-portal)'
suppressionDuration: PT5H
triggerOperator: GreaterThan
suppressionEnabled: false
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Entra ID/Analytic Rules/AzureRBAC.yaml
version: 1.0.0
queryFrequency: 2h
severity: High
eventGroupingSettings:
aggregationKind: SingleAlert
tactics:
- PrivilegeEscalation
enabled: true
id: 132fdff4-c044-4855-a390-c1b71e0f833b
relevantTechniques:
- T1078