AuditLogs
| where Category =~ "AzureRBACRoleManagementElevateAccess"
| where ActivityDisplayName =~ "User has elevated their access to User Access Administrator for their Azure Resources"
| extend Actor = tostring(InitiatedBy.user.userPrincipalName)
| extend IPAddress = tostring(InitiatedBy.user.ipAddress)
| project
TimeGenerated,
Actor,
OperationName,
IPAddress,
Result,
LoggedByService
description: |
'Detects when a Global Administrator elevates access to all subscriptions and management groups in a tenant. When a Global Administrator elevates access they are assigned the User Access Administrator role at root scope. This Microsoft Sentinel Analytic Rule monitors who has elevated access in your tenant so that admins can take appropriate action. [Learn more](https://learn.microsoft.com/en-us/azure/role-based-access-control/elevate-access-global-admin?tabs=azure-portal)'
kind: Scheduled
alertRuleTemplateName:
suppressionEnabled: false
queryFrequency: 2h
suppressionDuration: PT5H
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Entra ID/Analytic Rules/AzureRBAC.yaml
triggerOperator: GreaterThan
severity: High
relevantTechniques:
- T1078
triggerThreshold: 0
name: Azure RBAC (Elevate Access)
entityMappings:
- fieldMappings:
- columnName: Actor
identifier: Name
entityType: Account
- fieldMappings:
- columnName: IPAddress
identifier: Address
entityType: IP
requiredDataConnectors:
- connectorId: AzureActiveDirectory
dataTypes:
- AuditLogs
enabled: true
id: 132fdff4-c044-4855-a390-c1b71e0f833b
queryPeriod: 2h
incidentConfiguration:
createIncident: true
groupingConfiguration:
groupByAlertDetails: []
reopenClosedIncident: false
groupByEntities: []
groupByCustomDetails: []
matchingMethod: AllEntities
lookbackDuration: PT5H
enabled: false
tactics:
- PrivilegeEscalation
version: 1.0.0
query: |
AuditLogs
| where Category =~ "AzureRBACRoleManagementElevateAccess"
| where ActivityDisplayName =~ "User has elevated their access to User Access Administrator for their Azure Resources"
| extend Actor = tostring(InitiatedBy.user.userPrincipalName)
| extend IPAddress = tostring(InitiatedBy.user.ipAddress)
| project
TimeGenerated,
Actor,
OperationName,
IPAddress,
Result,
LoggedByService
eventGroupingSettings:
aggregationKind: SingleAlert